An ISCM capability that identifies unmanaged devices that are likely to be used by attackers as a platform from which to extend compromise of the network to be mitigated.
Source(s):
NISTIR 8011 Vol. 1
See Capability, Hardware Asset Management.
Source(s):
NISTIR 8011 Vol. 1
under Hardware Asset Management