UEM-02: Is there a defined, documented, applicable and evaluated list containing approved
services, applications, and the sources of applications (stores) acceptable for
use by endpoints when accessing or storing organization-managed data?
For managed endpoints, universally enforce policies through one or more centralized configuration management tools.
Use risk assessment to determine what (if any) information or systems may be accessed or stored using unmanaged endpoints.
Control implemented
Control ownership
Description
Define, document, apply and evaluate a list of approved services,
applications and sources of applications (stores) acceptable for use by endpoints
when accessing or storing organization-managed data.