CM-7 (5)

CM-7 (5) H M

The organization:
(a) Identifies [Assignment: organization-defined software programs authorized to execute on the information system];
(b) Employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system; and
(c) Reviews and updates the list of authorized software programs [Assignment: organization- defined frequency].

  • H CM-7(5) (c) [at least quarterly or when there is a change]
  • M CM-7(5) (c) [ at least Annually or when there is a change]
DISA Cloud Computing SRG

a. Not appropriate for DoD to define for all CSP's infrastructure or service offerings;
c. Monthly


Supplemental Guidance

The process used to identify software programs that are authorized to execute on organizational information systems is commonly referred to as whitelisting. In addition to whitelisting, organizations consider verifying the integrity of white-listed software programs using, for example, cryptographic checksums, digital signatures, or hash functions. Verification of white-listed software can occur either prior to execution or at system startup.

Related Controls