2.7: Utilize Application Whitelisting

Utilize application whitelisting technology on all assets to ensure that only authorized software executes and all unauthorized software is blocked from executing on assets.

Asset Type

Security Function

Implementation Groups

Applications

Protect

3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

  • Sub-control 2.1: Maintain Inventory of Authorized Software

  • Sub-control 2.5: Integrate Software and Hardware Asset Inventories

Inputs

  1. The list of endpoints

  2. The list of authorized software

Operations

  1. Enumerate endpoints capable of leveraging whitelisting technology (e.g. some network and other devices may not enable third-party software installation or otherwise have constrained environments precluding the use of whitelisting software)

  2. For each eligible endpoint (operation 1), examine the software inventory for whitelisting applications related to that endpoint, noting endpoints with and without whitelisting capabilities

  3. For each endpoint with whitelisting capabilities, examine the whitelisting software’s configuration to ensure only authorized software is considered executable and that attempts to execute unauthorized software is blocked, noting appropriately and inappropriately configured software

Measures

  • M1 = List of endpoints capable of leveraging whitelisting technology

  • M2 = List of endpoints with whitelisting capabilities installed

  • M3 = List of endpoints without whitelisting capabilities installed

  • M4 = List of endpoints with appropriately configured whitelisting capabilities

  • M5 = List of endpoints with inappropriately configured whitelisting capabilities

  • M6 = Count of endpoints capable of leveraging whitelisting technology (count of M1)

  • M7 = Count of endpoints with whitelisting capabilities installed (count of M2)

  • M8 = The number of endpoints without whitelisting capabilities installed (count of M3)

  • M9 = Count of endpoints with appropriately configured whitelisting capabilities (count of M4)

  • M10 = Count of endpoints with inappropriately configured whitelisting capabilities (count of M5)

Metrics

Whitelisting Installation Coverage

Metric

The ratio of endpoints with whitelisting capabilities installed to the number of
whitelisting-eligible endpoints

Calculation

M7 / M6

Whitelisting Configuration Coverage

Metric

The ratio of endpoints with appropriately configured whitelisting capabilities
to the number of endpoints with whitelisting capabilities

Calculation

M9 /  M7