Under active development Content is continuously updated and improved

CM-11User-installed Software

LI-SaaS
Low
Moderate
High

>Control Description

a

Establish organization-defined policies governing the installation of software by users;

b

Enforce software installation policies through the following methods: organization-defined methods; and

c

Monitor policy compliance organization-defined frequency.

>FedRAMP Baseline Requirements

Parameter Values

c
Continuously (via CM-7 (5))

>Discussion

If provided the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations include updates and security patches to existing software and downloading new applications from organization-approved app stores.

Prohibited software installations include software with unknown or suspect pedigrees or software that organizations consider potentially malicious. Policies selected for governing user-installed software are organization-developed or provided by some external entity. Policy enforcement methods can include procedural methods and automated methods.

>Cross-Framework Mappings

>Programmatic Queries

Beta

Related Services

SSM
AppStream
WorkSpaces

CLI Commands

List SSM software inventory
aws ssm list-inventory-entries --instance-id INSTANCE_ID --type-name AWS:Application
Check SSM patch compliance
aws ssm list-compliance-items --resource-ids INSTANCE_ID --resource-types ManagedInstance
List AppStream application catalog
aws appstream describe-applications
Check WorkSpaces application settings
aws workspaces describe-workspace-bundles --query 'Bundles[*].{Name:Name,RootStorage:RootStorage,UserStorage:UserStorage}'

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CM-11 (User-Installed Software)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CM-11?
  • How frequently is the CM-11 policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to CM-11?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CM-11 requirements.
  • What automated tools, systems, or technologies are deployed to implement CM-11?
  • How is CM-11 integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CM-11 requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CM-11?
  • What audit logs, records, reports, or monitoring data validate CM-11 compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CM-11 effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CM-11 compliance?

Ask AI

Configure your API key to use AI features.