Most organizations assume that corporate devices only run approved software. In reality, that assumption is often wrong. Users are inherently focused on being more efficient, finding workarounds to meet their timelines, etc. This natural behavior creates blind spots and risks for many organizations and highlights the importance of assessing authorized and unauthorized software use within an environment.
CIS Control 2.3 exists because unauthorized software is everywhere—and it quietly increases your attack surface without adding business value.
What Is CIS Control 2.3?
This safeguard requires organizations to identify software that is not on the approved list and either remove it or formally authorize it with documented risk acceptance.
If software is running and no one can explain why, that’s a problem.
Why Unauthorized Software Is So Dangerous
It Creates Blind Spots
Security tools, patching processes, and monitoring workflows are typically designed around known software to ensure legitimacy and that any vulnerabilities or flaws are remediated. Not having this awareness creates significant blind spots that attackers exploit and take advantage of. Unauthorized applications often fall outside those guardrails and security protections.
That means:
- No patching guarantees
- No vulnerability tracking
- No security review or awareness of potential data leakage or compromise.
Attackers live in those blind spots and routinely exploit software to bring attacks.
It Often Enters Through Legitimate Users
Unauthorized software isn’t always malicious at first. Common sources include:
- “Helpful” utilities or widgets installed by employees
- Freeware or trial software
- Shadow IT tools for file sharing or remote access
Unfortunately, many breaches start with software that was installed with good intentions; however, this opens to the door to security holes, invisible credential misuse against installed cloud or hosted applications, or data leakage depending on how applications are used. Additionally, user browsing behaviors are encountering unwanted downloads or applications that are bundled in with other software or downloaded simply by going to a legitimate website URL. These applications (known as PuP or PuA) have the potential to harvest data, cookies, and other information for adversaries to use to install other programs.
Malware Frequently Masquerades as Legitimate Software
Some unauthorized software isn’t installed by users at all—it’s dropped by attackers after initial access. As an example, consider why a random remote management software installed on various systems is different than your legitimate RMM solution. Was this left over? Or are there potential signs of compromise? Adversaries today are routinely using remote management software, and if you’re not regularly checking what’s installed, you may never notice persistence mechanisms hiding in plain sight.
How SMBs Can Tackle Control 2.3 Pragmatically
Compare Installed Software to the Approved List
On a regular basis (monthly is a great start):
- Pull a list of installed software from endpoints
- Compare it against your authorized inventory
- Flag anything that doesn’t belong
This simple comparison is the core of Control 2.3.
Remove What Isn’t Needed
If software isn’t required for business operations, remove it. Fewer applications mean:
- Fewer vulnerabilities
- Less patching overhead
- Smaller attack surface
Security often improves by subtraction.
Formally Approve What Is Needed (or ask!)
Sometimes unauthorized software turns out to be legitimately useful. When that happens:
- Add it to the authorized list
- Assign an owner
- Confirm support and patching requirements
Alternatively, ask your teams what software and solutions they are using to achieve their functions, objectives, etc. Review the feedback and consider opportunities for allowing this solution. This turns shadow IT into managed IT to drive businesses forward.
Automate Detection Where Possible
Leveraging endpoint management tools can alert you when:
- New software is installed
- Unknown executables appear
- Users install applications outside policy
Automation helps you catch issues early—before they become incidents.
The Bottom Line
Unauthorized software isn’t just clutter—it’s unmanaged risk.
By adhering to CIS Control 2.3, organizations regain control over what’s running in their environment, improve awareness into user activity, productivity, and risks, and ensures that every application is either:
- Approved and managed, or
- Removed entirely
When you know what software is running—and why—your security posture becomes far more predictable, defensible, and resilient.