An ISCM capability that identifies unauthorized software on devices that is likely to be used by attackers as a platform from which to extend compromise of the network to be mitigated.
Sources:
NISTIR 8011 Vol. 1
under Capability, Software Asset Management
See Capability, Software Asset Management.
Sources:
NISTIR 8011 Vol. 1