2.7: Allowlist Authorized Scripts
Use technical controls, such as digital signatures and version control, to ensure that only authorized scripts, such as specific .ps1, .py, etc. files, are allowed to execute. Block unauthorized scripts from executing. Reassess bi-annually, or more frequently.
Asset Type |
Security Function |
Implementation Groups |
---|---|---|
Applications |
Protect |
3 |
Dependencies
Safeguard 2.1: Establish and Maintain a Software Inventory
Safeguard 4.1: Establish and Maintain a Secure Configuration Process
Inputs
GV5
: Authorized allowlisting softwareThe list of authorized scripts
GV3
: Approved configuration StandardsDate of last assessement of this safeguard
Operations
Use
GV5
to identify and enumerate all enterprise authorized software capable of executing scripts, including allowlisting software, email client applications, and web client applications (M1)Use
GV3
to identify approved configurations for all software identified in Operation 1- For each item in identified in Operation 1, use the approved configurations from Operation 2
Identify and enumerate software properly configured to allow execution of authorized and signed scripts from Input 2 (M2)
Identify and enumerate software improperly configured to allow execution of authorized and signed scripts from Input 2(M3)
Compare the date from Input 4 to current date and note timeframe in months (M4).
Measures
M1 = Count of authorized software capable of executing scripts
M2 = Count of properly configured software
M3 = Count of improperly configured software
M4 = Timeframe since last assessment of this safeguard
Metrics
If M4 is greater than six months, then this safeguard is measured at a 0 and receives a failing score. The other metrics don’t apply.
Coverage
Metric |
The percentage of appropriately configured allowlisting software instances within the enterprise.
|
Calculation |
|