1.2: Address Unauthorized Assets
- Critical Security Controls Version 7.1:
- 1.6: Address Unauthorized Assets
Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise may choose to remove the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]