Require that the following user-installed software execute in a confined physical or virtual machine environment with limited privileges: [user-installed software required to be executed in a confined environment is defined;].
Supplemental
Organizations identify software that may be of concern regarding its origin or potential for containing malicious code. For this type of software, user installations occur in confined environments of operation to limit or contain damage from malicious code that may be executed.