Mechanisms exist to detect the presence of unauthorized software, systems and services in use by the organization.