2.3—Address Unauthorized Software
IG1
IG2
IG3
Software
Respond
>Control Description
Ensure that unauthorized software is either removed from use on enterprise assets or receives a documented exception. Review monthly, or more frequently.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.