CM-8(5)—Information System Component Inventory
PBMM (P2)
Secret (P2)
Operational
>Control Description
INFORMATION SYSTEM COMPONENT INVENTORY | NO DUPLICATE ACCOUNTING OF COMPONENTS The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system component inventories.
>Supplemental Guidance
This control enhancement addresses the potential problem of duplicate accounting of information system components in large or complex interconnected systems.
>Tailoring Guidance
Control enhancement (5) ensures that unauthorized components are detected and, just as importantly, that authorized components don’t go missing.
Ask AI
Configure your API key to use AI features.