3.4.2e—Automated Detection of Misconfigured or Unauthorized Components
>Control Description
Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, [Selection (one or more): remove the components; place the components in a quarantine or remediation network] to facilitate patching, re-configuration, or other mitigations.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.