3204.0—3204.0
>Control Description
The Supplier shall implement proportionate measures to:
i) Detect the presence of unauthorised hardware, software, and firmware components within the system using tooling
ii) Take the following actions when unauthorised components are detected: disable network access by such components; isolate the components; notify systems administrators and/or security operations teams.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.