Identify software programs; Employ an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the system; and Review and update the list of unauthorized software programs frequency.
Unauthorized software programs can be limited to specific versions or from a specific source. The concept of prohibiting the execution of unauthorized software may also be applied to user actions, system ports and protocols, IP addresses/ranges, websites, and MAC addresses.
software programs are identified; an allow-all, deny-by-exception policy is employed to prohibit the execution of unauthorized software programs on the system; the list of unauthorized software programs is reviewed and updated frequency.
No cross-framework mappings available