CM-8 (03)—System Component Inventory | Automated Unauthorized Component Detection
>Control Description
>FedRAMP Baseline Requirements
No FedRAMP-specific parameter values or requirements for this baseline.
>Discussion
Automated unauthorized component detection is applied in addition to the monitoring for unauthorized remote connections and mobile devices. Monitoring for unauthorized system components may be accomplished on an ongoing basis or by the periodic scanning of systems for that purpose. Automated mechanisms may also be used to prevent the connection of unauthorized components (see CM-7 (9)).
Automated mechanisms can be implemented in systems or in separate system components. When acquiring and implementing automated mechanisms, organizations consider whether such mechanisms depend on the ability of the system component to support an agent or supplicant in order to be detected since some types of components do not have or cannot support agents (e.g., IoT devices, sensors). Isolation can be achieved , for example, by placing unauthorized system components in separate domains or subnets or quarantining such components.
This type of component isolation is commonly referred to as sandboxing.
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of CM-8(3) (Automated Unauthorized Component Detection)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring CM-8(3)?
- •How frequently is the CM-8(3) policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to CM-8(3)?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce CM-8(3) requirements.
- •What automated tools, systems, or technologies are deployed to implement CM-8(3)?
- •How is CM-8(3) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce CM-8(3) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of CM-8(3)?
- •What audit logs, records, reports, or monitoring data validate CM-8(3) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of CM-8(3) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate CM-8(3) compliance?
Ask AI
Configure your API key to use AI features.