CM-11 User-Installed Software

Configuration Management

Low Moderate High

Description

a. Establish [Assignment: organization-defined policies] governing the installation of software by users; b. Enforce software installation policies through [Assignment: organization-defined methods]; and c. Monitor policy compliance [Assignment: organization-defined frequency].

Supplemental Guidance

If provided the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations include updates and security patches to existing software and downloading new applications from organization-approved application stores. Prohibited software installations include software with unknown or suspect pedigrees or software that organizations consider potentially malicious.

Changes from Rev 4

No significant changes from Rev 4.

Compliance Mappings

ISO 27001:2022

A.8.18A.8.19A.8.9

ISO 27002:2022

5.378.188.19

COBIT 2019

BAI10

CIS Controls v8

CIS 2CIS 2.3CIS 9.4

NIST CSF 2.0

PR.PS-02PR.PS-05

CSA CCM v4

UEM-02

CSA AICM v1

UEM-02

ASD Essential Eight

E8-1

BIO2

5.378.188.19

RBI CSF

Annex1.2

UAE IA

T7

Qatar NIA

OS

CBE CSF

CTO-7

SA JS2

JS2-8.4

BoM CTRM

3.123.6

FFIEC IS

II.C.11II.C.13(e)

ECB CROE

CROE.2.3.4

EBA ICT Guidelines

3.4.4

SEBI CSCRF

PR.ESPR.IP

BOT Cyber Resilience

Ch2.1Ch2.6

CMMC 2.0

CM

Lloyd's Minimum Standards

MS8.10MS8.4