myctrl.tools
Compare

CM-7(9)Prohibiting The Use Of Unauthorized Hardware

>Control Description

Enterprises should define requirements and deploy appropriate processes to specify and detect hardware that is not allowed. This can be aided by defining a requirement to, at a minimum, not use disreputable or unauthorized hardware. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-tier contractors

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.