Attach asset location technologies to distributed assets.
CONTROL ID 10626
CONTROL TYPE Physical and Environmental Protection
CLASSIFICATION Detective
SUPPORTING AND SUPPORTED CONTROLS
This Control directly supports the implied Control(s):
Protect distributed assets against theft., CC ID: 06799
This Control has the following implementation support Control(s):
Employ asset location technologies in accordance with applicable laws and regulations., CC ID: 10627
SELECTED AUTHORITY DOCUMENTS COMPLIED WITH
configure remote locate and wipe functionality (Control: ISM-1555; Revision: 1; Bullet 5, Australian Government Information Security Manual, June 2023)
configure remote locate and wipe functionality (Control: ISM-1555; Revision: 1; Bullet 5, Australian Government Information Security Manual, September 2023)
Each device shall have a unique visible identifier affixed to it or should be identifiable using secure, cryptographically-protected methods. (E7, Payment Card Industry (PCI), PIN Transaction Security (PTS) Hardware Security Module (HSM) - Security Requirements, Version 2.0)
Employ [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]. (PE-20 Control, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 2 Controls)
Employ [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]. (PE-20 Control, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 3 Controls)
People and Asset Tracking. Locating people and vehicles in a large installation is important for safety reasons, and it is increasingly important for security reasons as well. Asset location technologies can be used to track the movements of people and vehicles within the plant, to ensure that they … (§ 6.2.11 ICS-specific Recommendations and Guidance ¶ 4 Bullet 3, Guide to Industrial Control Systems (ICS) Security, Revision 2)
The organization employs {organizationally documented asset location technologies} to track and monitor the location and movement of {organizationally documented assets} within {organizationally documented controlled areas}. (PE-20a., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Deprecated, Revision 4, Deprecated)
Employs [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]; and (PE-20a., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
Employ [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]. (PE-20 Control, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
Employ [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]. (PE-20 Control, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)
Employs [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]; and (PE-20a., Supply Chain Risk Management Practices for Federal Information Systems and Organizations, NIST Special Publication 800-161, April 2015)