Is Software Installation Restricted Solely to Authorized Personnel, with an Inventory of Approved Applications?
Table of Contents
Description
At Wolkvox, software installation on corporate devices is strictly restricted to authorized personnel, as part of the controls defined in the Information Security Management System (ISMS). This measure aims to prevent the installation of unapproved applications, which could compromise the security, integrity, and availability of the company’s systems and data.
To ensure compliance, an up-to-date inventory of permitted applications is maintained, and administrative permissions are exclusively assigned to trained and authorized personnel. Additionally, continuous monitoring is conducted to detect and block any unauthorized installation attempts.
Features
Software Installation Controls
- Restriction of Administrative Permissions: Only authorized personnel (e.g., IT team) have permissions to install or modify software on corporate devices.
- Inventory of Approved Applications: An updated list of permitted tools and applications is maintained, aligned with operational and security needs.
- Block Unauthorized Software: Endpoint management solutions are used to prevent the execution of unapproved applications.
Monitoring and Compliance
- Monitoring Tools: Automated systems are employed to detect unauthorized installation attempts and generate real-time alerts.
- Periodic Audits: Corporate devices are reviewed to verify that only approved applications are used and that no vulnerabilities are introduced by unauthorized software.
- Training and Awareness: Employees receive training on software installation policies and the risks associated with using unapproved applications.