{"id":5454,"date":"2020-04-03T10:03:35","date_gmt":"2020-04-03T15:03:35","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?p=5454"},"modified":"2025-01-29T13:12:48","modified_gmt":"2025-01-29T18:12:48","slug":"cm-l2-3-4-9","status":"publish","type":"post","link":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/","title":{"rendered":"CM.L2-3.4.9 User-Installed Software"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>CMMC Requirement CM.L2-3.4.9 &#8211; User-Installed Software: Control and monitor user-installed software.<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.3&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#bcbcbc&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]Links to Publicly Available Resources<\/p>\n<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat370 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/docs.aws.amazon.com\/config\/latest\/developerguide\/operational-best-practices-for-cmmc_2.0_level_2.html\" id=\"link-16968\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Amazon Web Services &#8211; Operational Best Practices for CMMC 2.0 Level 2<\/a>\n<p>The following provides a sample mapping between the Cybersecurity Maturity Model Certification (CMMC) 2.0 Level 2 and AWS managed Config rules. Each Config rule applies to a specific AWS resource, and relates to one or more CMMC 2.0 Level 2 controls. A CMMC 2.0 Level 2 control can be related to multiple Config rules.<\/p><\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL2v2.pdf\" id=\"link-9989\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 2 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2.<\/p><\/li>\n<li><a href=\"https:\/\/www.fortect.com\/how-to-guides\/how-to-prevent-unauthorized-software-installation-on-windows-pc\/?srsltid=AfmBOopsGrnqUdcUMVOQXSD5R3DBh4z4RVL7yFCRUz_i07ToMaVER_Kd\" id=\"link-17089\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Fortect &#8211; How to Prevent Unauthorized Software Installation on Windows PC<\/a>\n<p>This blog examines practical strategies to prevent unauthorized software installations and protect your Windows PC from potential threats.<\/p><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/archive\/technet-wiki\/53218.windows-10-version-1903-prevent-software-installation-by-users\" id=\"link-6133\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Microsoft \u2013 Windows 10 Version 1903: Prevent Software Installation by Users<\/a>\n<p>This article from Microsoft, describes how administrators can configure Windows 10 to prevent users from installing software.<\/p><\/li>\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-167.pdf\" id=\"link-11278\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-167: Guide to Application Whitelisting<\/a>\n<p>The purpose of this publication is to assist organizations in understanding the basics of application whitelisting and planning for its implementation.<\/p><\/li>\n<li><a href=\"https:\/\/www.windows-active-directory.com\/gpo-to-prevent-regular-users-from-changing-msi-installation-options.html\" id=\"link-17090\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Windows Active Directory &#8211; GPO to Prevent Regular Users From Changing MSI Installation Options<\/a>\n<p>This guide is designed for system administrators and provides detailed step-by-step instructions, advanced configuration options, and real-world use cases.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: '89940d9abd',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n<\/span><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;][\/et_pb_divider][et_pb_testimonial quote_icon=&#8221;off&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; author_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; author_text_shadow_vertical_length_tablet=&#8221;0px&#8221; author_text_shadow_blur_strength_tablet=&#8221;1px&#8221; position_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; position_text_shadow_vertical_length_tablet=&#8221;0px&#8221; position_text_shadow_blur_strength_tablet=&#8221;1px&#8221; company_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; company_text_shadow_vertical_length_tablet=&#8221;0px&#8221; company_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_horizontal_image_tablet=&#8221;0px&#8221; box_shadow_vertical_image_tablet=&#8221;0px&#8221; box_shadow_blur_image_tablet=&#8221;40px&#8221; box_shadow_spread_image_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; sticky_enabled=&#8221;0&#8243;]Discussion [NIST SP 800-171 R2]<br \/>\nUsers can install software in organizational systems if provided the necessary privileges. To maintain control over the software installed, organizations identify permitted and prohibited actions regarding software installation through policies. Permitted software installations include updates and security patches to existing software and applications from organization-approved \u201capp stores.\u201d Prohibited software installations may include software with unknown or suspect pedigrees or software that organizations consider potentially malicious. The policies organizations select governing user-installed software may be organization-developed or provided by some external entity. Policy enforcement methods include procedural methods, automated methods, or both.<\/p>\n<p>Further Discussion<br \/>\nSoftware that users have the ability to install is limited to items that the organization approves. When not controlled, users could install software that can create unnecessary risk. This risk applies both to the individual machine and to the larger operating environment. Policies and technical controls reduce risk to the organization by preventing users from installing unauthorized software.[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section bb_built=\"1\"][et_pb_row][et_pb_column type=\"4_4\"][et_pb_text _builder_version=\"4.2.2\" text_text_shadow_horizontal_length=\"text_text_shadow_style,%91object Object%93\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length=\"text_text_shadow_style,%91object Object%93\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength=\"text_text_shadow_style,%91object Object%93\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length=\"link_text_shadow_style,%91object Object%93\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length=\"link_text_shadow_style,%91object Object%93\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength=\"link_text_shadow_style,%91object Object%93\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length=\"ul_text_shadow_style,%91object Object%93\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length=\"ul_text_shadow_style,%91object Object%93\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength=\"ul_text_shadow_style,%91object Object%93\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length=\"ol_text_shadow_style,%91object Object%93\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length=\"ol_text_shadow_style,%91object Object%93\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength=\"ol_text_shadow_style,%91object Object%93\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length=\"quote_text_shadow_style,%91object Object%93\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length=\"quote_text_shadow_style,%91object Object%93\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength=\"quote_text_shadow_style,%91object Object%93\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length=\"header_text_shadow_style,%91object Object%93\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length=\"header_text_shadow_style,%91object Object%93\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength=\"header_text_shadow_style,%91object Object%93\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length=\"header_2_text_shadow_style,%91object Object%93\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length=\"header_2_text_shadow_style,%91object Object%93\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength=\"header_2_text_shadow_style,%91object Object%93\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length=\"header_3_text_shadow_style,%91object Object%93\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length=\"header_3_text_shadow_style,%91object Object%93\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength=\"header_3_text_shadow_style,%91object Object%93\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length=\"header_4_text_shadow_style,%91object Object%93\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length=\"header_4_text_shadow_style,%91object Object%93\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength=\"header_4_text_shadow_style,%91object Object%93\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length=\"header_5_text_shadow_style,%91object Object%93\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length=\"header_5_text_shadow_style,%91object Object%93\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength=\"header_5_text_shadow_style,%91object Object%93\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length=\"header_6_text_shadow_style,%91object Object%93\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length=\"header_6_text_shadow_style,%91object Object%93\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength=\"header_6_text_shadow_style,%91object Object%93\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\" vertical_offset_tablet=\"0\" horizontal_offset_tablet=\"0\" z_index_tablet=\"0\"]\r\n\r\nAC.2.005: Provide privacy and security notices consistent with applicable CUI rules.\r\n\r\n[\/et_pb_text][et_pb_text _builder_version=\"4.2.2\" text_text_shadow_horizontal_length=\"text_text_shadow_style,%91object Object%93\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length=\"text_text_shadow_style,%91object Object%93\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength=\"text_text_shadow_style,%91object Object%93\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length=\"link_text_shadow_style,%91object Object%93\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length=\"link_text_shadow_style,%91object Object%93\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength=\"link_text_shadow_style,%91object Object%93\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length=\"ul_text_shadow_style,%91object Object%93\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length=\"ul_text_shadow_style,%91object Object%93\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength=\"ul_text_shadow_style,%91object Object%93\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length=\"ol_text_shadow_style,%91object Object%93\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length=\"ol_text_shadow_style,%91object Object%93\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength=\"ol_text_shadow_style,%91object Object%93\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length=\"quote_text_shadow_style,%91object Object%93\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length=\"quote_text_shadow_style,%91object Object%93\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength=\"quote_text_shadow_style,%91object Object%93\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length=\"header_text_shadow_style,%91object Object%93\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length=\"header_text_shadow_style,%91object Object%93\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength=\"header_text_shadow_style,%91object Object%93\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length=\"header_2_text_shadow_style,%91object Object%93\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length=\"header_2_text_shadow_style,%91object Object%93\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength=\"header_2_text_shadow_style,%91object Object%93\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length=\"header_3_text_shadow_style,%91object Object%93\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length=\"header_3_text_shadow_style,%91object Object%93\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength=\"header_3_text_shadow_style,%91object Object%93\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length=\"header_4_text_shadow_style,%91object Object%93\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length=\"header_4_text_shadow_style,%91object Object%93\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength=\"header_4_text_shadow_style,%91object Object%93\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length=\"header_5_text_shadow_style,%91object Object%93\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length=\"header_5_text_shadow_style,%91object Object%93\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength=\"header_5_text_shadow_style,%91object Object%93\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length=\"header_6_text_shadow_style,%91object Object%93\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length=\"header_6_text_shadow_style,%91object Object%93\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength=\"header_6_text_shadow_style,%91object Object%93\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\" vertical_offset_tablet=\"0\" horizontal_offset_tablet=\"0\" z_index_tablet=\"0\"]\r\n\r\n<a href=\"https:\/\/ndisac.org\/dibscc\/links\/cloudfaq19\/microsoft-azure-security-fundamentals\/\">Microsoft \u2013 Azure Security Fundamentals<\/a><a href=\"https:\/\/ndisac.org\/dibscc\/links\/regulations\/uk-ministry-of-defences-mod-defcon-658-cyber\/\">UK Ministry of Defence\u2019s (MOD) DEFCON 658 (Cyber)<\/a><a href=\"https:\/\/ndisac.org\/dibscc\/links\/ir-exercises-implementation\/mitre-cyber-exercise-playbook\/\">MITRE \u2013 Cyber Exercise Playbook<\/a>\r\n\r\n[\/et_pb_text][et_pb_divider _builder_version=\"4.2.2\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\" vertical_offset_tablet=\"0\" horizontal_offset_tablet=\"0\" z_index_tablet=\"0\" \/][et_pb_testimonial _builder_version=\"4.2.2\" quote_icon_background_color=\"#f5f5f5\" box_shadow_horizontal_image_tablet=\"0px\" box_shadow_vertical_image_tablet=\"0px\" box_shadow_blur_image_tablet=\"40px\" box_shadow_spread_image_tablet=\"0px\" text_shadow_horizontal_length=\"text_shadow_style,%91object Object%93\" text_shadow_horizontal_length_tablet=\"0px\" text_shadow_vertical_length=\"text_shadow_style,%91object Object%93\" text_shadow_vertical_length_tablet=\"0px\" text_shadow_blur_strength=\"text_shadow_style,%91object Object%93\" text_shadow_blur_strength_tablet=\"1px\" body_link_text_shadow_horizontal_length=\"body_link_text_shadow_style,%91object Object%93\" body_link_text_shadow_horizontal_length_tablet=\"0px\" body_link_text_shadow_vertical_length=\"body_link_text_shadow_style,%91object Object%93\" body_link_text_shadow_vertical_length_tablet=\"0px\" body_link_text_shadow_blur_strength=\"body_link_text_shadow_style,%91object Object%93\" body_link_text_shadow_blur_strength_tablet=\"1px\" body_ul_text_shadow_horizontal_length=\"body_ul_text_shadow_style,%91object Object%93\" body_ul_text_shadow_horizontal_length_tablet=\"0px\" body_ul_text_shadow_vertical_length=\"body_ul_text_shadow_style,%91object Object%93\" body_ul_text_shadow_vertical_length_tablet=\"0px\" body_ul_text_shadow_blur_strength=\"body_ul_text_shadow_style,%91object Object%93\" body_ul_text_shadow_blur_strength_tablet=\"1px\" body_ol_text_shadow_horizontal_length=\"body_ol_text_shadow_style,%91object Object%93\" body_ol_text_shadow_horizontal_length_tablet=\"0px\" body_ol_text_shadow_vertical_length=\"body_ol_text_shadow_style,%91object Object%93\" body_ol_text_shadow_vertical_length_tablet=\"0px\" body_ol_text_shadow_blur_strength=\"body_ol_text_shadow_style,%91object Object%93\" body_ol_text_shadow_blur_strength_tablet=\"1px\" body_quote_text_shadow_horizontal_length=\"body_quote_text_shadow_style,%91object Object%93\" body_quote_text_shadow_horizontal_length_tablet=\"0px\" body_quote_text_shadow_vertical_length=\"body_quote_text_shadow_style,%91object Object%93\" body_quote_text_shadow_vertical_length_tablet=\"0px\" body_quote_text_shadow_blur_strength=\"body_quote_text_shadow_style,%91object Object%93\" body_quote_text_shadow_blur_strength_tablet=\"1px\" author_text_shadow_horizontal_length=\"author_text_shadow_style,%91object Object%93\" author_text_shadow_horizontal_length_tablet=\"0px\" author_text_shadow_vertical_length=\"author_text_shadow_style,%91object Object%93\" author_text_shadow_vertical_length_tablet=\"0px\" author_text_shadow_blur_strength=\"author_text_shadow_style,%91object Object%93\" author_text_shadow_blur_strength_tablet=\"1px\" position_text_shadow_horizontal_length=\"position_text_shadow_style,%91object Object%93\" position_text_shadow_horizontal_length_tablet=\"0px\" position_text_shadow_vertical_length=\"position_text_shadow_style,%91object Object%93\" position_text_shadow_vertical_length_tablet=\"0px\" position_text_shadow_blur_strength=\"position_text_shadow_style,%91object Object%93\" position_text_shadow_blur_strength_tablet=\"1px\" company_text_shadow_horizontal_length=\"company_text_shadow_style,%91object Object%93\" company_text_shadow_horizontal_length_tablet=\"0px\" company_text_shadow_vertical_length=\"company_text_shadow_style,%91object Object%93\" company_text_shadow_vertical_length_tablet=\"0px\" company_text_shadow_blur_strength=\"company_text_shadow_style,%91object Object%93\" company_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\" vertical_offset_tablet=\"0\" horizontal_offset_tablet=\"0\" z_index_tablet=\"0\" quote_icon=\"off\"]\r\n\r\nCMMC CLARIFICATION\r\nEvery   system   has   legal   information   about   user   privacy   and   security. A system-use notification banner displays the legal requirements of using the systems.  Users are required to click to agree to the displayed requirements of using the system each time they logon to the machine.  You can use this implicit agreement in the civil and\/or criminal prosecution of an attacker that violates the terms.\r\nDiscuss  legal  notification  requirements  with  your  organization\u2019s  legal  counsel.    This  will  ensure that they meet all applicable requirements.  You should inform the user that:\r\n\u2022 you may monitor, record, and subject to audit any information system usage;\r\n\u2022 you prohibit unauthorized use of the information system;\r\n\u2022 you may subject unauthorized use to criminal and civil penalties; and\r\n\u2022 use of the information system indicates consent to monitoring and recording.\r\n\r\n[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section]","_et_gb_content_width":"","footnotes":""},"categories":[330],"tags":[],"class_list":["post-5454","post","type-post","status-publish","format-standard","hentry","category-level-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CM.L2-3.4.9 User-Installed Software - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CM.L2-3.4.9 User-Installed Software - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-03T15:03:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-29T18:12:48+00:00\" \/>\n<meta name=\"author\" content=\"markcarr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markcarr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/\",\"name\":\"CM.L2-3.4.9 User-Installed Software - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2020-04-03T15:03:35+00:00\",\"dateModified\":\"2025-01-29T18:12:48+00:00\",\"author\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\"},\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CM.L2-3.4.9 User-Installed Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\",\"name\":\"markcarr\",\"url\":\"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CM.L2-3.4.9 User-Installed Software - DIB SCC CyberAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/","og_locale":"en_US","og_type":"article","og_title":"CM.L2-3.4.9 User-Installed Software - DIB SCC CyberAssist","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/","og_site_name":"DIB SCC CyberAssist","article_published_time":"2020-04-03T15:03:35+00:00","article_modified_time":"2025-01-29T18:12:48+00:00","author":"markcarr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markcarr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/","url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/","name":"CM.L2-3.4.9 User-Installed Software - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2020-04-03T15:03:35+00:00","dateModified":"2025-01-29T18:12:48+00:00","author":{"@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0"},"breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"CM.L2-3.4.9 User-Installed Software"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0","name":"markcarr","url":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":" <a href=\"https:\/\/ndisac.org\/dibscc\/category\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/\" rel=\"tag\">Level 2<\/a>","rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/5454"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=5454"}],"version-history":[{"count":8,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/5454\/revisions"}],"predecessor-version":[{"id":15164,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/5454\/revisions\/15164"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=5454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/categories?post=5454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=5454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}