U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

ITL Bulletin

Stopping Malware and Unauthorized Software through Application Whitelisting

Date Published: December 2015

Author(s)

Adam Sedgewick (NIST), Murugiah Souppaya (NIST), Karen Scarfone (Scarfone Cybersecurity), Larry Feldman (G2)

Abstract

Keywords

access control; application control; application whitelisting; information security; software security; whitelisting
Control Families

Audit and Accountability; Risk Assessment; System and Communications Protection

Documentation

Publication:
December 2015 ITL Bulletin

Supplemental Material:
None available

Document History:
12/15/15: ITL Bulletin (Final)