2.5: Allowlist Authorized Software
CSF v1.1 References:
Threats Addressed:
Previous Version:
- Critical Security Controls Version 7.1:
- 2.7: Utilize Application Whitelisting
Control Statement
Use technical controls, such as application allowlisting, to ensure that only authorized software can execute or be accessed. Reassess bi-annually, or more frequently.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]