Security Requirements for 03.04.08 Authorized Software – Allow by Exception

If provided with the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations include updates and security patches to existing software and downloading new applications from organization-approved “app stores.” The policies selected for governing user-installed software are organization-developed or provided by some external entity. Policy enforcement methods can include procedural methods and automated methods. Authorized software programs can be limited to specific versions or come from specific sources. To facilitate a comprehensive authorized software process and increase the strength of protection against attacks that bypass application-level authorized software, software programs may be decomposed into and monitored at different levels of detail. These levels include applications, application programming interfaces, application modules, scripts, system processes, system services, kernel functions, registries, drivers, and dynamic link libraries.

View CPRT 03.04.08
  1. 03.04.08.a

    Identify software programs authorized to execute on the system.

  1. 03.04.08.b

    Implement a deny-all, allow-by-exception policy for the execution of authorized software programs on the system.

  1. 03.04.08.c

    Review and update the list of authorized software programs [Assignment: organization-defined frequency].