The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system inventories.
This control enhancement addresses the potential problem of duplicate accounting of information system components in large or complex interconnected systems.