-
(a): Identify [software programs not authorized to execute on the system are defined;];
-
(b): Employ an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the system; and
-
(c): Review and update the list of unauthorized software programs [frequency at which to review and update the list of unauthorized software programs is defined;].
Supplemental
Unauthorized software programs can be limited to specific versions or from a specific source. The concept of prohibiting the execution of unauthorized software may also be applied to user actions, system ports and protocols, IP addresses/ranges, websites, and MAC addresses.