wf by Pablo Delgado on September 25, 2017 in Previous article Critical Control # 2: Inventory of Authorized and Unauthorized Software