CIS RAM is an information security risk assessment method that helps organizations implement and assess their security posture against the CIS Controls.  The CIS Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to thwart the most pervasive attacks. The CIS Controls are a relatively short list of high-priority, highly effective defensive actions that provide a “must-do, do-first” starting point for every enterprise seeking to improve their cyber defense.

CIS Control 1:  This is a basic Control

Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access.

To access this control, please click here.  The full link is:  https://www.cisecurity.org/controls/inventory-and-control-of-hardware-assets/