NIST 800-53 REV 5 • SYSTEM AND INFORMATION INTEGRITY
SI-7(14) — Binary or Machine Executable Code
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
Restrict or prohibit the use of binary or machine-executable code from unverified sources — do not run random executables on your systems.
Example 1: Use Windows Defender Application Control (WDAC) to allow only signed, approved executables to run. Create a policy that allows Microsoft-signed binaries, your organization's signed software, and specifically approved third-party applications. Block everything else.
Example 2: Implement AppLocker via GPO to restrict executable files, scripts, and DLLs to approved locations and publishers. Users cannot run executables downloaded from the internet or saved to their desktop — only approved software from approved installation paths can execute.