The organizations written policy must include a process for how whitelisted applications are deemed to be allowed.

From McAfee Application Control 7.x Security Technical Implementation Guide

Part of SRG-APP-000386

Associated with: CCI-001774

SV-88879r1_rule The organizations written policy must include a process for how whitelisted applications are deemed to be allowed.

Vulnerability discussion

Enabling application whitelisting without adequate design and organization-specific requirements will either result in an implementation which is too relaxed or an implementation which causes denial of service to its user community. Documenting the specific requirements and trust model before configuring and deploying the McAfee Application Control software is mandatory.

Check content

Consult with the ISSO/ISSM to review the organizational-specific written policy for the McAfee Application Control software. Verify the written policy includes a process for how applications are vetted and deemed to be allowed. If no written policy exists, this is a finding. If written policy does not include a process for vetting applications before allowing them, this is a finding.

Fix text

Follow the formal change and acceptance process to update the written policy to include a process for how applications are vetted and deemed to be allowed.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer