CM-11—User-installed Software
>Control Description
Establish ⚙organization-defined policies governing the installation of software by users;
Enforce software installation policies through the following methods: ⚙organization-defined methods; and
Monitor policy compliance ⚙organization-defined frequency.
>DoD Impact Level Requirements
FedRAMP Parameter Values
CM-11 (c) [Continuously (via CM-7 (5))]
>Discussion
If provided the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations include updates and security patches to existing software and downloading new applications from organization-approved app stores.
Prohibited software installations include software with unknown or suspect pedigrees or software that organizations consider potentially malicious. Policies selected for governing user-installed software are organization-developed or provided by some external entity. Policy enforcement methods can include procedural methods and automated methods.
>Programmatic Queries
Related Services
CLI Commands
aws ssm list-inventory-entries --instance-id INSTANCE_ID --type-name AWS:Applicationaws ssm list-compliance-items --resource-ids INSTANCE_ID --resource-types ManagedInstanceaws appstream describe-applicationsaws workspaces describe-workspace-bundles --query 'Bundles[*].{Name:Name,RootStorage:RootStorage,UserStorage:UserStorage}'>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of CM-11 (User-Installed Software)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring CM-11?
- •How frequently is the CM-11 policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to CM-11?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce CM-11 requirements.
- •What automated tools, systems, or technologies are deployed to implement CM-11?
- •How is CM-11 integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce CM-11 requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of CM-11?
- •What audit logs, records, reports, or monitoring data validate CM-11 compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of CM-11 effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate CM-11 compliance?
Ask AI
Configure your API key to use AI features.