An ISCM capability that identifies unmanaged devices that are likely to be used by attackers as a platform from which to extend compromise of the network to be mitigated.
Sources:
NISTIR 8011 Vol. 1
See Capability, Hardware Asset Management.
Sources:
NISTIR 8011 Vol. 1
under Hardware Asset Management