Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Stopping Malware and Unauthorized Software through Application Whitelisting

Published

Author(s)

Adam Sedgewick, Murugiah Souppaya, Karen Scarfone, Larry Feldman

Abstract

This bulletin summarizes the information presented in NIST Special Publication 800-167, "Guide to Application Whitelisting," written by Adam Sedgewick, Murugiah Souppaya and Karen Scarfone. The publication is intended to assist organizations in understanding the basics of application whitelisting. An application whitelist is a list of applications and application components that are authorized for use in an organization.
Citation
ITL Bulletin -

Keywords

access control, application control, application whitelisting, information security, software security, whitelisting

Citation

Sedgewick, A. , Souppaya, M. , Scarfone, K. and Feldman, L. (2015), Stopping Malware and Unauthorized Software through Application Whitelisting, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=919956 (Accessed October 4, 2025)

Issues

If you have any questions about this publication or are having problems accessing it, please contact [email protected].

Created December 14, 2015, Updated October 12, 2021
Was this page helpful?