CCC-04: Unauthorized Software Installations

PF v1.0 References:

Warning icon.

Control is withdrawn in the next version of this control set and incorporated into: CCC-04: Unauthorized Change Protection.

Control Statement

Policies and procedures shall be established, and supporting business processes and technical measures implemented, to restrict the installation of unauthorized software on organizationally-owned or managed user end-point devices (e.g., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.

[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]

Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.