Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access to the network is an example of what security method?
The CIS RAM is an information scurity risk assessment method that helps organizations implement and assess their security posture against the CIS controls.