parallax background

Inventory and Control of Hardware

CIS Control 1


Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access.

Why is this Critical?


Attackers are continuously scanning target organizations, waiting for new and unprotected hardware assets to be attached to the network - particularly those that are not configured and patched with appropriate security updates. Even devices that are not visible from the internet can be used as access points into the network. With the ability to actively manage all hardware devices on your network, you can ensure only authorized devices have access and unauthorized devices are found and prevented from gaining access. Managed control of devices also plays a critical role in planning and executing system backup, incident response, and recovery.

This CIS Control is typically worked together with CIS Control 2 - Inventory and Control of Software Assets.

Ready to solve your security needs?

Choose Cyvatar for your managed security outcomes.

Haven't found what you're looking for?

Our team of advisors loves questions. Let us know what problems you are trying to solve and we'll help you find a solution.

Get Started for Free