NIST 800-53 REV 5 • CONFIGURATION MANAGEMENT

CM-2(4)Unauthorized Software

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

This enhancement was incorporated into CM-7. It previously focused on identifying and preventing unauthorized software on your systems.

Example 1: Use Microsoft Defender Application Control (WDAC) to block execution of any software not on your approved list.

Example 2: Run regular SCCM software inventory reports and compare them against your approved software list, flagging unauthorized installations for removal.