Software Asset Management (CIS Control 2)
CIS Control 2 focuses on software asset management: maintaining a complete inventory of authorised software and actively preventing unauthorised software from being installed or executed. Unauthorised software is one of the most common entry points for malware and cyberattacks.
Back to Dictionary- Dictionary
- Software Asset Management (CIS)
Table of Contents
Why software asset management matters
Unauthorised software poses a security risk for several reasons: it may not receive security updates, it may contain hidden malware, and it may include vulnerable components. Pirated or free software from untrusted sources is a classic attack vector.
Software asset management is also important for licence compliance and for preventing 'software sprawl' that unnecessarily increases the attack surface.
The software inventory
The software inventory should record the following for each application: software name and version, vendor, authorisation status, and the systems on which it is installed. The inventory is used on an ongoing basis to identify outdated software that needs updating or removal.
A comprehensive software inventory works hand in hand with the hardware asset inventory required by CIS Control 1, providing a complete picture of the organisation's IT landscape.
Handling unauthorised software
CIS Control 2 prescribes that unauthorised software must either be removed, blocked or subjected to a formal approval process. At IG2 and IG3, technical controls such as application whitelisting are typically employed to actively block any software not on the approved list.
Shadow IT: Employees often install software for productivity purposes without IT's knowledge. A clear software policy combined with easy access to approved alternatives reduces the shadow IT problem.
IG1 safeguards
IG1 requires the following for Control 2: establishing and maintaining a software inventory, ensuring that only authorised software is used, and handling unauthorised software when it is discovered.
Frequently Asked Questions about Software Asset Management (CIS Control 2)
What is CIS Control 2?
CIS Control 2 covers software asset management. It requires organisations to maintain a complete inventory of authorised software and actively prevent the installation and execution of unauthorised software.
Why is software asset management important for security?
Unauthorised software often lacks security updates, may contain malware, and increases the attack surface. By maintaining a controlled software inventory, organisations reduce the risk of compromise through unvetted applications.
What is application whitelisting?
Application whitelisting is a technical control that only allows pre-approved software to run on an organisation's systems. All software not on the approved list is automatically blocked, providing strong protection against unauthorised programs.
What does IG1 require for CIS Control 2?
IG1 requires organisations to establish and maintain a software inventory, ensure only authorised software is in use, and address any unauthorised software that is discovered on their systems.
How does CIS Control 2 relate to CIS Control 1?
CIS Control 1 covers hardware asset management and Control 2 covers software asset management. Together they provide a complete inventory of an organisation's IT assets, which is the foundation for all other security controls.
Related Terms
Logging and Monitoring (CIS)
CIS Control 8 covers the collection, protection and analysis of audit logs from systems and applications to detect and investigate security incidents.
doraEmail Security (CIS)
CIS Control 9 covers technical and organisational controls to protect against threats via email and web browsers, including phishing and malware.
doraSecure Configuration (CIS)
CIS Control 4 requires organisations to establish and maintain secure configurations for all enterprise hardware and software to minimise the attack surface.
doraVulnerability Management (CIS)
CIS Control 7 requires a continuous and structured process for discovering, assessing and remediating vulnerabilities in an organisation's systems and software.
Related Articles
Info
.legal A/S
hello@dotlegal.com
+45 7027 0127
VAT-no: DK40888888
Support
support@dotlegal.com
+45 7027 0127
Need help?
Let me help you get started
+45 7027 0127 and I'll get you started
.legal is not a law firm and is therefore not under the supervision of the Bar Council.