- Develop and document an inventory of system components that:
- Accurately reflects the system;
- Includes all components within the system;
- Does not include duplicate accounting of components or components assigned to any other system;
- Is at the level of granularity deemed necessary for tracking and reporting; and
- Includes the following information to achieve system component accountability: [Assignment: organization-defined information deemed necessary to achieve effective system component accountability]; and
- Review and update the system component inventory [Assignment: organization-defined frequency].
System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories that include components from all organizational systems. In such situations, organizations ensure that the inventories include system-specific information required for component accountability. The information necessary for effective accountability of system components includes the system name, software owners, software version numbers, hardware inventory specifications, software license information, and for networked components, the machine names and network addresses across all implemented protocols (e.g., IPv4, IPv6). Inventory specifications include date of receipt, cost, model, serial number, manufacturer, supplier information, component type, and physical location.
Preventing duplicate accounting of system components addresses the lack of accountability that occurs when component ownership and system association is not known, especially in large or complex connected systems. Effective prevention of duplicate accounting of system components necessitates use of a unique identifier for each component. For software inventory, centrally managed software that is accessed via other systems is addressed as a component of the system on which it is installed and managed. Software installed on multiple organizational systems and managed at the system level is addressed for each individual system and may appear more than once in a centralized component inventory, necessitating a system association for each software instance in the centralized inventory to avoid duplicate accounting of components. Scanning systems implementing multiple network protocols (e.g., IPv4 and IPv6) can result in duplicate components being identified in different address spaces. The implementation of CM-8(7) can help to eliminate duplicate accounting of components.
Update the inventory of system components as part of component installations, removals, and system updates.
Maintain the currency, completeness, accuracy, and availability of the inventory of system components using [Assignment: organization-defined automated mechanisms].
Detect the presence of unauthorized hardware, software, and firmware components within the system using [Assignment: organization-defined automated mechanisms] [Assignment: organization-defined frequency]; and Take the following actions when unauthorized components are detected: [Assignment (one or more): disable network access by such components, isolate the components, notify [Assignment: organization-defined personnel or roles] ].
Include in the system component inventory information, a means for identifying by [Assignment (one or more): name, position, role], individuals responsible and accountable for administering those components.
Include assessed component configurations and any approved deviations to current deployed configurations in the system component inventory.
Provide a centralized repository for the inventory of system components.
Support the tracking of system components by geographic location using [Assignment: organization-defined automated mechanisms].
Assign system components to a system; and Receive an acknowledgement from [Assignment: organization-defined personnel or roles] of this assignment.