Under active development Content is continuously updated and improved

3.4.2eAutomated Detection of Misconfigured or Unauthorized Components

>Control Description

Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, [Selection (one or more): remove the components; place the components in a quarantine or remediation network] to facilitate patching, re-configuration, or other mitigations.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.