2.7: Utilize Application Whitelisting

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:

Group:

Next Version:

Control Statement

Utilize application whitelisting technology on all assets to ensure that only authorized software executes and all unauthorized software is blocked from executing on assets.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]