STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Trellix Application Control 8.x Security Technical Implementation Guide

V-213325

CAT II (Medium)

The organizations written policy must include procedures for how often the whitelist of allowed applications is reviewed.

Rule ID

SV-213325r944827_rule

STIG

Trellix Application Control 8.x Security Technical Implementation Guide

Version

V2R2

CCIs

SV-88881

Discussion

Enabling application whitelisting without adequate design and organization-specific requirements will either result in an implementation which is too relaxed or an implementation which causes denial of service to its user community. Documenting the specific requirements and trust model before configuring and deploying the Trellix Application Control software is mandatory.

Check Content

Consult with the ISSO/ISSM to review the organizational-specific written policy for the Trellix Application Control software.

Verify the written policy includes a process for how often the application whitelist is reviewed.

If no written policy exists, this is a finding.

If written policy does not include a process for how often the application whitelist is reviewed, this is a finding.

Fix Text

Follow the formal change and acceptance process to update the written policy to include a process for how often the application whitelist is reviewed.