1.6: Address Unauthorized Assets

CSF v1.1 References:

PF v1.0 References:

Group:

Next Version:

Control Statement

Ensure that unauthorized assets are either removed from the network, quarantined, or the inventory is updated in a timely manner.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]