Automated mechanisms exist to detect and alert upon the detection of unauthorized hardware, software and firmware components.
Does the organization use automated mechanisms to detect and alert upon the detection of unauthorized hardware, software and firmware components?