ID.AM-08:

Systems, hardware, software, services, and data are managed throughout their life cycles

Implementation Examples

Ex1: 

Integrate cybersecurity considerations throughout the life cycles of systems, hardware, software, and services

Ex2: 

Integrate cybersecurity considerations into product life cycles

Ex3: 

Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)

Ex4: 

Periodically identify redundant systems, hardware, software, and services that unnecessarily increase the organization's attack surface

Ex5: 

Properly configure and secure systems, hardware, software, and services prior to their deployment in production

Ex6: 

Update inventories when systems, hardware, software, and services are moved or transferred within the organization

Ex7:

Securely destroy stored data based on the organization's data retention policy using the prescribed destruction method, and keep and manage a record of the destructions

Ex8: 

Securely sanitize data storage when hardware is being retired, decommissioned, reassigned, or sent for repairs or replacement

Ex9:

Offer methods for destroying paper, storage media, and other physical forms of data storage