An inventory of assets associated with information and information processing facilities within the organization shall be documented, reviewed, and updated when changes occur.
The inventory of assets associated with information and information processing facilities shall reflect changes in the organization’s context and include all information necessary for effective accountability.
When unauthorized hardware is detected, it shall be quarantined for possible exception handling, removed, or replaced, and the inventory shall be updated accordingly.
Mechanisms for detecting the presence of unauthorized hardware and firmware components within the organization's network shall be identified.