Under active development Content is continuously updated and improved

3204.03204.0

>Control Description

The Supplier shall implement proportionate measures to: i) Detect the presence of unauthorised hardware, software, and firmware components within the system using tooling ii) Take the following actions when unauthorised components are detected: disable network access by such components; isolate the components; notify systems administrators and/or security operations teams.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.