Benchmark: 1.2 Address Unauthorized Assets
Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise may choose to remove the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.
Browse dashboards and select 1.2 Address Unauthorized Assets:
Or run the benchmarks in your terminal:
steampipe check aws_compliance.benchmark.cis_controls_v8_ig1_1_2
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share aws_compliance.benchmark.cis_controls_v8_ig1_1_2