PR.PS-05:

Installation and execution of unauthorized software are prevented

Implementation Examples

Ex1:

When risk warrants it, restrict software execution to permitted products only or deny the execution of prohibited and unauthorized software

Ex2:

Verify the source of new software and the software's integrity before installing it

Ex3:

Configure platforms to use only approved DNS services that block access to known malicious domains

Ex4:

Configure platforms to allow the installation of organization-approved software only