2.3
IG1 IG2 IG3

Address Unauthorized Software

Asset Type: Applications
Security Function: Respond

Description

Ensure that unauthorized software is either removed from use on enterprise assets or receives a documented exception. Review monthly, or more frequently.

Implementation Checklist

1
Define response procedures and playbooks
2
Assign response roles and responsibilities
3
Establish response timeframes and SLAs
4
Test response procedures through tabletop or simulation
5
Document lessons learned and update procedures
6
Establish software authorization review process
7
Deploy application allowlisting technology
8
Maintain and update authorized software list

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Malware Masquerading as Legitimate Applications

Confidentiality

Unauthorized software including remote access trojans, cryptominers, or backdoors persists on endpoints because no process exists to identify and remove them.

Shadow SaaS Data Leakage

Confidentiality

Employees install unauthorized cloud sync clients or SaaS tools that exfiltrate corporate data to unmanaged cloud storage outside organizational visibility.

Vulnerabilities (When Safeguard Absent)

No Remediation Process for Unauthorized Software

Without a process to remove or exception unauthorized software, non-compliant and potentially malicious applications accumulate across the enterprise unchecked.

Lack of Regular Software Compliance Reviews

Unauthorized software is never flagged because no regular review cycle compares installed applications against the approved software inventory.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Response procedure/playbook documentation Reviewed bi-annually
Record Response action logs showing procedure execution Per incident
Document Governing policy document (current, approved, communicated) Reviewed annually