CM-7(9)—Prohibiting The Use Of Unauthorized Hardware
>Control Description
Enterprises should define requirements and deploy appropriate processes to specify and detect hardware that is not allowed. This can be aided by defining a requirement to, at a minimum, not use disreputable or unauthorized hardware. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-tier contractors
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.