Lesson 8.3 — Application allow listing: approved applications, code signing and blocking untrusted software
This lesson explains the application allow listing route within the Cyber Essentials Malware Protection control.
What You'll Be Able to Do
By the end of this lesson, you will be able to:
- explain what application allow listing is
- identify where it is suitable
- create or review an approved application list
- understand the role of code signing
- check whether users can install unsigned or invalidly signed applications
- review exceptions and emergency changes
Why This Matters
It helps the learner understand how allow listing differs from anti-malware software, why approved applications must be controlled before deployment, why code signing matters, how unsigned or invalidly signed applications should be blocked, and what evidence is needed if the organisation relies on allow listing as its malware protection method.
The most common problems are:
- confusing software inventory with allow listing;
- claiming allow listing without technical enforcement;
- approving applications after deployment instead of before;
- failing to maintain a current approved list;
The Core Rule
Application allow listing is one of the accepted Cyber Essentials malware protection routes.
It works by allowing only approved applications to execute and blocking everything else.
What the CE Assessor Looks For
A strong position shows:
- device groups using allow listing are clearly identified;
- only approved applications can execute;
- applications are actively approved before deployment;
- a current approved application list exists;
- applications are restricted by code signing;
- unsigned applications are blocked;
Common Mistakes
- confusing software inventory with allow listing;
- claiming allow listing without technical enforcement;
- approving applications after deployment instead of before;
- failing to maintain a current approved list;
- allowing users to install unsigned applications;
- allowing invalidly signed applications;
Copy This
Keep this rule visible:
If the application is not approved, trusted and signed, it should not run on a device protected by allow listing.
Quick Checklist
Before moving on, make sure you can say yes to these:
- [ ] What is application allow listing?
- [ ] How is allow listing different from anti-malware software?
- [ ] What does Cyber Essentials expect where allow listing is used?
- [ ] Why is a software inventory not the same as an allow list?
- [ ] Why does code signing matter?
Your Action
Do this now — it takes 10–20 minutes.
If using allow-listing on any devices: document which applications are on the approved list and how the list is enforced. Add to Section MP.
Key Takeaway
If the application is not approved, trusted and signed, it should not run on a device protected by allow listing.
Your Workbook Activity
Complete: Application allow listing review and approved application record
Next Lesson
In the next lesson: Application sandboxing: how app store controls work and what to check for Option B