STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

CM-8 (3)

Configuration ManagementRev 5organization

System Component Inventory

Baselines:ModerateHigh

Control Statement

(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [Assignment: organization-defined automated mechanisms] [Assignment: frequency] ; and (b) Take the following actions when unauthorized components are detected: [Selection: organization-defined value].

Supplemental Guidance

Automated unauthorized component detection is applied in addition to the monitoring for unauthorized remote connections and mobile devices. Monitoring for unauthorized system components may be accomplished on an ongoing basis or by the periodic scanning of systems for that purpose. Automated mechanisms may also be used to prevent the connection of unauthorized components (see [CM-7(9)](#cm-7.9) ). Automated mechanisms can be implemented in systems or in separate system components. When acquiring and implementing automated mechanisms, organizations consider whether such mechanisms depend on the ability of the system component to support an agent or supplicant in order to be detected since some types of components do not have or cannot support agents (e.g., IoT devices, sensors). Isolation can be achieved , for example, by placing unauthorized system components in separate domains or subnets or quarantining such components. This type of component isolation is commonly referred to as "sandboxing."

Related Controls (9)

AC-19CA-7RA-5SC-3SC-39SC-44SI-3SI-4SI-7

CCI Identifiers (6)

CCI-001783Defines the personnel or roles to be notified when unauthorized hardware, software, and firmware components are detected within the system.CCI-001784When unauthorized hardware, software, and firmware components are detected within the system, the organization takes action to disable network access by such components, isolates the components, and/or notifies organization-defined personnel or roles.CCI-000415Defines the frequency of employing automated mechanisms to detect the presence of unauthorized hardware, software, and firmware components within the system.CCI-000416Detect the presence of unauthorized hardware, software, and firmware components within the system using organization-defined automated mechanisms, on an organization-defined frequency.CCI-000417The organization disables network access by unauthorized components/devices or notifies designated organizational officials.CCI-003969Defines the automated mechanisms for detecting the presence of unauthorized hardware, software, and firmware components within the system.

Linked STIG Checks (2)

Across 2 STIGs. Click to expand.