Title
AUTHORIZED SOFTWARE / WHITELISTING
Description
The organization:
Supplemental
The process used to identify software programs that are authorized to execute on organizational information systems is commonly referred to as whitelisting. In addition to whitelisting, organizations consider verifying the integrity of white-listed software programs using, for example, cryptographic checksums, digital signatures, or hash functions. Verification of white-listed software can occur either prior to execution or at system startup.
Reference Item Details
Related: CM-2,CM-6,CM-8,PM-5,SA-10,SC-34,SI-7
Category: CONFIGURATION MANAGEMENT
Parent Title: LEAST FUNCTIONALITY
Family: CONFIGURATION MANAGEMENT