The organization documents an inventory of information system components that includes all components within the authorization boundary of the information system.
No STIG checks reference this CCI.