{
  "$TMF_VERSION": "1.4",
  "PublicationDateTime": "2021-04-26T00:00:00.000Z",
  "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-7 (4): Unauthorized Software / Blacklisting. Applicable to MODERATE impact and HIGH impact systems.",
  "Keywords": [
    "800-53",
    "Configuration Management",
    "Moderate",
    "NIST",
    "Security",
    "Unauthorized Software / Blacklisting"
  ],
  "Issuer": {
    "Identifier": "https://trustmarkinitiative.org/",
    "PrimaryContact": {
      "Email": "help@trustmarkinitiative.org",
      "Telephone": "555-555-5555",
      "Kind": "PRIMARY",
      "WebsiteURL": "https://trustmarkinitiative.org/",
      "Responder": ""
    },
    "Name": "TMI"
  },
  "Sources": [{
    "Identifier": "SP800-53R4",
    "Reference": "NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at <a href=\"http://dx.doi.org/10.6028/NIST.SP.800-53r4\">http://dx.doi.org/10.6028/NIST.SP.800-53r4<\/a>.",
    "$id": "source-2112165102"
  }],
  "Name": "NIST SP 800-53 r4 Security Control CM-7 (4): Unauthorized Software / Blacklisting",
  "TrustExpression": "TD_ref1 and TD_ref2 and TD_ref3",
  "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-7-_4__-unauthorized-software-_-blacklisting/4/",
  "Version": "4",
  "References": {"TrustmarkDefinitionRequirements": [
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/least-functionality-_-unauthorized-software-review-and-update/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization regularly reviews and updates the list of unauthorized software programs.",
      "Number": 1,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/least-functionality-_-unauthorized-software-review-and-update/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization regularly reviews and updates the list of unauthorized software programs.",
        "Number": 1,
        "Version": "1.0",
        "Name": "Least Functionality | Unauthorized Software Review and Update"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Least Functionality | Unauthorized Software Review and Update",
      "$id": "TD_ref1"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/least-functionality-_-unauthorized-software-identified/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization identifies software programs not authorized to execute on the information system.",
      "Number": 2,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/least-functionality-_-unauthorized-software-identified/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization identifies software programs not authorized to execute on the information system.",
        "Number": 2,
        "Version": "1.0",
        "Name": "Least Functionality | Unauthorized Software Identified"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Least Functionality | Unauthorized Software Identified",
      "$id": "TD_ref2"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/least-functionality-_-unauthorized-software-execution-blacklisting/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system.",
      "Number": 3,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/least-functionality-_-unauthorized-software-execution-blacklisting/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system.",
        "Number": 3,
        "Version": "1.0",
        "Name": "Least Functionality | Unauthorized Software Execution Blacklisting"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Least Functionality | Unauthorized Software Execution Blacklisting",
      "$id": "TD_ref3"
    }
  ]},
  "Primary": "false",
  "LegalNotice": "This document and the information contained herein is provided on an \"AS IS\" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
  "$Type": "TrustInteroperabilityProfile"
}