Back to Control Explorer

CM.4.073

Content

Control Acronym

CM

Family

Configuration Management

CMMC Level

4

800-171 Control #

N/A

CMMC Description

Employ application whitelisting and an application vetting process for systems identified by the organization.

CMMC Clarification

The organization has a procedure to validate systems used for processing CUI information and to identify the applications required for CUI processing. The procedure includes the steps a new application must go through to check it is not malicious and there is a business requirement for the application before it is added to the whitelist. The organization has configured their systems (e.g., desktop, laptop, tablet) to check an application has been approved for use (whitelisted) before the application can run. All unapproved applications are, by default blocked from running on the organization’s systems. See practice RM.5.152 for more information on handling non-whitelisted software. Example 1 You are responsible for system security at your organization. An employee asks you to approve a data visualization application they want to use to develop charts in their final report to the sponsor. After you confirm with the project manager that the application is required, you run a script to calculate the MD5 hash value for the executable and submit it to virustotal.com for validation. After confirming the application is safe you add the application to the whitelist. Example 2 You are responsible for system security at your organization. An employee asks you to whitelist an application found through an Internet search. You download a copy of the file and submit it to virustotal.com. You determine that it is malicious. You delete all copies of the application from all of your organizations’s computers and do not add it to the organization’s whitelist.

800-171 Description

800-171 Discussion

N/A

Other Source Discussion

(MODIFIED From 800-171r2) The process used to identify software programs that are not authorized to execute on systems is commonly referred to as blacklisting. The process used to identify software programs that are authorized to execute on systems is commonly referred to as whitelisting. Whitelisting is the stronger of the two policies for restricting software program execution. In addition to whitelisting, organizations consider verifying the integrity of whitelisted software programs using, for example, cryptographic checksums, digital signatures, or hash functions. Verification of whitelisted software can occur either prior to execution or at system startup. This practices requires the use of application whitelisting where feasible. NIST SP 800-167 provides guidance on application whitelisting.

CIS Control References

CIS Controls v7.1 2.1, 2.2, 2.6, 2.7, 2.8, 2.9

NIST 800-53 Control Ref.

NIST SP 800-53 Rev 4 CM-7(4), CM-7(5)

CMMC Derived

NIST CSF Control References

NIST 800-171 References

Applicable FAR Clause

NIST CSF Control Reference

NIST CSF v1.1 PR.PT-3

CERT RMM Reference

CERT RMM v1.2 TM:SG2.SP2

Modification of NIST 800-171B Reference

CMMC modification of NIST SP 800-171 3.4.8

NIST 800-171B Reference

UK NCSCCyber Reference

AS ACSC Reference

Sub-Criterias

Assessment Sub-Criteria 1

Assessment Sub-Criteria 2

Assessment Sub-Criteria 3

Assessment Sub-Criteria 4

Assessment Sub-Criteria 5

Assessment Sub-Criteria 6

Assessment Sub-Criteria 7

Assessment Sub-Criteria 8

Assessment Sub-Criteria 9

Assessment Sub-Criteria 10

Assessment Sub-Criteria 11

Assessment Sub-Criteria 12

Assessment Sub-Criteria 13

Assessment Sub-Criteria 14

Assessment Sub-Criteria 15