Under active development Content is continuously updated and improved · Last updated Feb 18, 2026, 2:55 AM UTC

CM-7(9)Prohibiting The Use Of Unauthorized Hardware

>Control Description

Enterprises should define requirements and deploy appropriate processes to specify and detect hardware that is not allowed. This can be aided by defining a requirement to, at a minimum, not use disreputable or unauthorized hardware. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-tier contractors

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.