The operating system must prohibit the use or connection of unauthorized hardware components.
Overview
Finding ID
Version
Rule ID
IA Controls
Severity
V-263651
SRG-OS-000690-GPOS-00140
SV-263651r982555_rule
Medium
Description
Hardware components provide the foundation for organizational systems and the platform for the execution of authorized software programs. Managing the inventory of hardware components and controlling which hardware components are permitted to be installed or connected to organizational systems is essential to provide adequate security.