2.9: Implement Application Whitelisting of Scripts

The organization’s application whitelisting software must ensure that only authorized, digitally signed scripts (such as .ps1,.py, macros, etc.) are allowed to run on a system.

Asset Type

Security Function

Implementation Groups

Applications

Protect

3

Dependencies

  • Sub-control 2.1: Maintain Inventory of Authorized Software

  • Sub-control 2.7: Utilize Application Whitelisting

Inputs

  1. The list of authorized software

  2. The list of authorized scripts

Operations

  1. Enumerate all instances of whitelisting software from the software inventory

  2. For each instance of whitelisting software, examine its configuration to ensure that it is configured to allow execution of authorized and signed scripts, noting appropriately and inappropriately configured whitelisting software

Measures

  • M1 = List of all instances of whitelisting software found in the software inventory

  • M2 = List of appropriately configured whitelisting software instances

  • M3 = List of inappropriately configured whitelisting software instances

  • M4 = Count of all instances of whitelisting software found in the software inventory (count of M1)

  • M5 = Count of appropriately configured whitelisting software instances (count of M2)

  • M6 = Count of inappropriately configured whitelisting software instances (count of M3)

Metrics

Coverage

Metric

The ratio of appropriately configured whitelisting software instances to the total
number of whitelisting software instances in the enterprise

Calculation

M5 / M4