Defines the automated mechanisms for detecting the presence of unauthorized hardware, software, and firmware components within the system.
No STIG checks reference this CCI.