The organization develops a list of software programs not authorized to execute on the information system.
19 rules found Severity: Low
12 rules found Severity: Medium
8 rules found Severity: Medium
2 rules found Severity: Low