Restrict the use of information inputs to [trusted sources to which the use of information inputs is to be restricted are defined;] and/or [formats to which the use of information inputs is to be restricted are defined;].
Supplemental
Restricting the use of inputs to trusted sources and in trusted formats applies the concept of authorized or permitted software to information inputs. Specifying known trusted sources for information inputs and acceptable formats for such inputs can reduce the probability of malicious activity. The information inputs are those defined by the organization in the base control ( [SI-10](#si-10)).