1.3
IG2 IG3

Utilize an Active Discovery Tool

Asset Type: Devices
Security Function: Detect

Description

Utilize an active discovery tool to identify assets connected to the enterprise’s network. Configure the active discovery tool to execute daily, or more frequently.

Implementation Checklist

1
Deploy detection tools or enable detection capabilities
2
Configure alerting thresholds and notification channels
3
Establish monitoring schedule and review process
4
Test detection capabilities with simulated events
5
Document detection procedures and escalation paths

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Undetected Compromised Host on Network

Confidentiality

Without active scanning, attacker-controlled devices or compromised hosts remain invisible on the network, enabling long-term data exfiltration campaigns.

Network Segmentation Bypass via Undiscovered Assets

Integrity

Assets that bridge network segments but are not discovered by active tools allow attackers to pivot between zones that should be isolated.

Vulnerabilities (When Safeguard Absent)

No Automated Network Asset Discovery

Relying solely on manual inventory processes means new or transient devices connected to the network are not detected in a timely manner.

Infrequent Discovery Scanning

Without daily active discovery scans, the gap between a device connecting to the network and its detection grows, increasing the window for unauthorized activity.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Detection tool deployment evidence (dashboard screenshots, agent status) Captured monthly
Technical Sample alert/detection output demonstrating capability Captured quarterly
Document Governing policy document (current, approved, communicated) Reviewed annually