Artificial & Autonomous Technologies

Mechanisms exist to track Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks are difficult to assess using currently available measurement techniques or where metrics are not yet available.


Login

Artificial & Autonomous Technologies

Mechanisms exist to prioritize, respond to and remediate Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks based on assessments and other analytical output.


Login

Asset Management

Mechanisms exist to facilitate an IT Asset Management (ITAM) program to implement and manage asset management controls.


Login

Asset Management

Mechanisms exist to identify and assess the security of technology assets that support more than one critical business function.


Login

Asset Management

Mechanisms exist to identify and involve pertinent stakeholders of critical systems, applications and services to support the ongoing secure management of those assets.


Login

Asset Management

Mechanisms exist to implement a scalable, standardized naming convention for systems, applications and services that avoids asset naming conflicts.


Login

Asset Management

Mechanisms exist to perform inventories of technology assets that: â–ª Accurately reflects the current systems, applications and services in use; â–ª Identifies authorized software products, including business justification details; â–ª Is at the level of granularity deemed necessary for tracking and reporting; â–ª Includes organization-defined information deemed necessary to achieve effective property accountability; and â–ª Is available for review and audit by designated organizational personnel.


Login

Asset Management

Mechanisms exist to update asset inventories as part of component installations, removals and asset upgrades.


Login

Asset Management

Automated mechanisms exist to detect and alert upon the detection of unauthorized hardware, software and firmware components.


Login

Asset Management

Mechanisms exist to establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components that prevents assets from being duplicated in other asset inventories.


Login