NIST 800-53 REV 5 • RISK ASSESSMENT
RA-5(7) — Automated Detection and Notification of Unauthorized Components
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
This enhancement uses automated tools to detect unauthorized hardware, software, or services on your network and alert you immediately. Rogue devices and unapproved software are common attack vectors.
Example 1: Deploy a Network Access Control (NAC) solution like Cisco ISE or Forescout that automatically detects devices connecting to your network and quarantines any device not in your approved inventory. Alert your security team when an unauthorized device is detected.
Example 2: In Microsoft Defender for Endpoint, enable Device Discovery to find unmanaged devices on your network. Configure alerts for new devices that appear and are not enrolled in management. Use Intune's compliance policies to block non-compliant devices from accessing corporate resources.