Explanation: The aim is to avoid execution of untrustworthy, possibly malicious, applications.

Vulnerabilities addressed: Addresses execution of unvetted application software.

Developer resources required: Requires that design and implementation include a whitelisting mechanism and attendant software to permit privileged users to update the whitelist needs.

Evaluator resources required: Requires manual review of whitelisting mechanism specification and implementation.

Source: www.computer.org