Back

Attach asset location technologies to distributed assets.


CONTROL ID
10626
CONTROL TYPE
Physical and Environmental Protection
CLASSIFICATION
Detective

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Protect distributed assets against theft., CC ID: 06799

This Control has the following implementation support Control(s):
  • Employ asset location technologies in accordance with applicable laws and regulations., CC ID: 10627


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • configure remote locate and wipe functionality (Control: ISM-1555; Revision: 1; Bullet 5, Australian Government Information Security Manual, June 2023)
  • configure remote locate and wipe functionality (Control: ISM-1555; Revision: 1; Bullet 5, Australian Government Information Security Manual, September 2023)
  • Each device shall have a unique visible identifier affixed to it or should be identifiable using secure, cryptographically-protected methods. (E7, Payment Card Industry (PCI), PIN Transaction Security (PTS) Hardware Security Module (HSM) - Security Requirements, Version 2.0)
  • Employ [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]. (PE-20 Control, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 2 Controls)
  • Employ [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]. (PE-20 Control, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 3 Controls)
  • People and Asset Tracking. Locating people and vehicles in a large installation is important for safety reasons, and it is increasingly important for security reasons as well. Asset location technologies can be used to track the movements of people and vehicles within the plant, to ensure that they … (§ 6.2.11 ICS-specific Recommendations and Guidance ¶ 4 Bullet 3, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • The organization employs {organizationally documented asset location technologies} to track and monitor the location and movement of {organizationally documented assets} within {organizationally documented controlled areas}. (PE-20a., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Deprecated, Revision 4, Deprecated)
  • Employs [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]; and (PE-20a., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
  • Employ [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]. (PE-20 Control, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
  • Employ [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]. (PE-20 Control, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)
  • Employs [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]; and (PE-20a., Supply Chain Risk Management Practices for Federal Information Systems and Organizations, NIST Special Publication 800-161, April 2015)