Benchmark: CM-8(3) Automated Unauthorized Component Detection
The organization employs automated mechanisms to detect the presence of unauthorized hardware, software, and firmware components within the information system and takes actions (disables network access by such components, isolates the components etc) when unauthorized components are detected.
Browse dashboards and select CM-8(3) Automated Unauthorized Component Detection:
Or run the benchmarks in your terminal:
steampipe check aws_compliance.benchmark.fedramp_moderate_rev_4_cm_8_3
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share aws_compliance.benchmark.fedramp_moderate_rev_4_cm_8_3