2.7: Utilize Application Whitelisting
PF v1.0 References:
Threats Addressed:
Group:
Next Version:
- Critical Security Controls Version 8:
- 2.5: Allowlist Authorized Software
Control Statement
Utilize application whitelisting technology on all assets to ensure that only authorized software executes and all unauthorized software is blocked from executing on assets.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]