2: Inventory and Control of Software Assets

CSF v1.1 References:

PF v1.0 References:

Control Statement

Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]

Subcontrols

2.2: Ensure Software is Supported by Vendor

Ensure that only software applications or operating systems currently supported and receiving vendor updates are added to the organization's authorized software inventory. Unsupported software should be tagged as unsupported in the inventory system.

2.4: Track Software Inventory Information

The software inventory system should track the name, version, publisher, and install date for all software, including operating systems authorized by the organization.

2.7: Utilize Application Whitelisting

Utilize application whitelisting technology on all assets to ensure that only authorized software executes and all unauthorized software is blocked from executing on assets.