Under active development Content is continuously updated and improved · Last updated Feb 18, 2026, 2:55 AM UTC

CM-7(4)Unauthorized Software -- Deny-By-Exception

>Control Description

Enterprises should define requirements and deploy appropriate processes to specify and detect software that is not allowed. This can be aided by defining a requirement to, at a minimum, not use disreputable or unauthorized software. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-tier contractors

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.