1.6: Address Unauthorized Assets
CSF v1.1 References:
PF v1.0 References:
Next Version:
- Critical Security Controls Version 8:
- 1.2: Address Unauthorized Assets
Control Statement
Ensure that unauthorized assets are either removed from the network, quarantined, or the inventory is updated in a timely manner.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]