1.2
IG1 IG2 IG3

Address Unauthorized Assets

Asset Type: Devices
Security Function: Respond

Description

Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise may choose to remove the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.

Implementation Checklist

1
Define response procedures and playbooks
2
Assign response roles and responsibilities
3
Establish response timeframes and SLAs
4
Test response procedures through tabletop or simulation
5
Document lessons learned and update procedures
6
Draft policy/procedure document
7
Obtain stakeholder review and approval
8
Communicate to affected personnel
9
Schedule periodic review and updates

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Rogue Device Network Infiltration

Confidentiality

An attacker or insider connects an unauthorized device (e.g., rogue wireless AP, USB-tethered device) to the corporate network to intercept traffic or establish a backdoor.

Compromised IoT Device Persistence

Integrity

Unauthorized IoT devices with default credentials remain on the network indefinitely, providing persistent attack vectors that bypass endpoint security controls.

BYOD Malware Introduction

Availability

Unmanaged personal devices infected with malware connect to the enterprise network without quarantine or review, spreading infections to production systems.

Vulnerabilities (When Safeguard Absent)

No Process to Quarantine or Remove Unauthorized Assets

Without a defined process for addressing unauthorized assets, rogue devices persist on the network indefinitely with no accountability or remediation timeline.

Delayed Response to Network Intrusions

The absence of a weekly review cycle for unauthorized assets means malicious or non-compliant devices can operate undetected for extended periods.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Response procedure/playbook documentation Reviewed bi-annually
Record Response action logs showing procedure execution Per incident
Document Governing policy document (current, approved, communicated) Reviewed annually