Mechanisms exist to whitelist or blacklist applications in an order to limit what is authorized to execute on systems.
Does the organization whitelist or blacklist applications in an order to limit what is authorized to execute on systems?