Under active development Content is continuously updated and improved

2.5Allowlist Authorized Software

IG2
IG3
Software
Protect

>Control Description

Use technical controls, such as application allowlisting, to ensure that only authorized software can execute or be accessed. Reassess bi-annually, or more frequently.

>Cross-Framework Mappings

>Relevant Technologies

Technology-specific guidance with authoritative sources and verification commands.

Ask AI

Configure your API key to use AI features.