PR.PS-05:
Installation and execution of unauthorized software are prevented
Implementation Examples
Ex1:
When risk warrants it, restrict software execution to permitted products only or deny the execution of prohibited and unauthorized software
Ex2:
Verify the source of new software and the software's integrity before installing it
Ex3:
Configure platforms to use only approved DNS services that block access to known malicious domains
Ex4:
Configure platforms to allow the installation of organization-approved software only