UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The organization (or information system) must enforce explicit rules governing the installation of software by users.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27127 SRG-APP-NA SV-34424r1_rule Medium
Description
If provided the privilege, information system users have the ability to install software. This can create security related issues if the users install unapproved or insecurely written software. The organization shall identify what types of software installations are permitted (e.g., updates and security patches to existing software) and what types of installations are prohibited (e.g., software whose pedigree with regard to being potentially malicious is unknown or suspect). This is an OS requirement and does not apply to applications.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None