3.1—3.1
>Control Description
System owners ensure that all applications and application components are identified and inventoried; only applications and application components that have been authorized by the appropriate authorizing official/CISO/CIO shall be utilized within the system owner's purview
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.