Capability, Hardware Asset Management: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
An ISCM capability that identifies unmanaged devices that are likely to be used by attackers as a platform from which to extend compromise of the network to be mitigated.
Source: NISTIR 8011 Vol. 1 | Category: