{"id":67931,"date":"2025-06-09T11:40:31","date_gmt":"2025-06-09T16:40:31","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=67931"},"modified":"2025-06-09T11:41:07","modified_gmt":"2025-06-09T16:41:07","slug":"why-application-allowlisting-is-now-essential-for-cmmc-compliance","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/","title":{"rendered":"Why Application Allowlisting Is Now Essential for CMMC Compliance"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\"><em>How DoD contractors can simplify security while meeting modern standards<\/em><\/h5>\n\n\n\n<p>As cyber threats continue to evolve, traditional security tools like antivirus software are no longer enough\u2014especially for organizations in the Department of Defense (DoD) supply chain. The need for a proactive, Zero Trust approach to cybersecurity has never been more urgent. One solution is rapidly gaining traction: <strong>application allowlisting<\/strong>.<\/p>\n\n\n\n<p>This blog post explores how allowlisting aligns with the Cybersecurity Maturity Model Certification (CMMC), why it&#8217;s now mandated for CMMC Level 2 compliance, and how PC Matic\u2019s solution makes it easier for organizations to meet these rigorous standards.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">What Is Application Allowlisting?<\/h3>\n\n\n\n<p>Application allowlisting is a security method that blocks all unknown applications by default and allows only those explicitly approved to run. This &#8220;default deny&#8221; approach drastically reduces the risk of ransomware, malware, and zero-day attacks.<\/p>\n\n\n\n<p>Unlike blacklisting, which reacts to known threats, allowlisting prevents <em>all<\/em> unauthorized or malicious software from ever executing\u2014even if it&#8217;s never been seen before.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Why the Shift? CMMC Level 2 and NIST Say So<\/h3>\n\n\n\n<p>With the release of <strong>NIST SP 800-171 Rev 3<\/strong>, application allowlisting is now the <em>only<\/em> approved software execution control method to meet <strong>CMMC Level 2\u2019s Practice CM.L2-3.4.8<\/strong>. Previous guidelines permitted either allowlisting or blacklisting. That\u2019s no longer the case.<\/p>\n\n\n\n<p>Allowlisting is also supported by other top-tier government agencies:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>NIST<\/strong> calls it the \u201csingle most effective strategy\u201d against malware.<\/li>\n\n\n\n<li><strong>CISA<\/strong> emphasizes its impact on reducing attack surfaces.<\/li>\n\n\n\n<li><strong>NSA<\/strong> includes it in its Top 10 Cybersecurity Mitigations.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Overcoming the Challenges of Traditional Allowlisting<\/h3>\n\n\n\n<p>Historically, allowlisting was difficult to implement due to manual configurations and constant updates. But modern solutions, like PC Matic, have revolutionized the process through automation and cloud-based allowlist management. This removes much of the complexity and user frustration, making allowlisting viable for organizations of all sizes.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">How PC Matic Makes Compliance Simple<\/h3>\n\n\n\n<p>PC Matic\u2019s application allowlisting solution is purpose-built to help DoD contractors and Managed Service Providers (MSPs) meet CMMC and NIST requirements.<\/p>\n\n\n\n<p>Key features include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Zero-Trust Enforcement<\/strong>: Blocks all unapproved software by default.<\/li>\n\n\n\n<li><strong>Global Allowlist of 22+ Billion Files<\/strong>: Reduces false positives and streamlines deployment.<\/li>\n\n\n\n<li><strong>Automated Threat Analysis<\/strong>: Unrecognized files are reviewed by malware experts.<\/li>\n\n\n\n<li><strong>Cloud-Based Management<\/strong>: Flexible deployment across diverse environments.<\/li>\n\n\n\n<li><strong>Seamless CMMC Alignment<\/strong>: Built to meet CM.L2-3.4.8 and NIST SP 800-171 Rev 3 directly.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion: Build a Stronger, Compliant Cyber Defense<\/h3>\n\n\n\n<p>As the DoD tightens its security expectations, application allowlisting has moved from a &#8220;nice-to-have&#8221; to a &#8220;must-have.&#8221; With tools like PC Matic, organizations can move beyond reactive security models and embrace a proactive, Zero Trust approach that protects data, systems, and supply chain integrity.<\/p>\n\n\n\n<p><strong>Want to dive deeper?<\/strong><br>Read the full whitepaper: <a href=\"https:\/\/www.linkedin.com\/smart-links\/AQFDsbYXyWOCLg\">Application Allowlisting and CMMC \u2013 Whitepaper<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How DoD contractors can simplify security while meeting modern standards As cyber threats continue to evolve, traditional security tools like antivirus software are no longer enough\u2014especially for organizations in the Department of Defense (DoD) supply chain. The need for a proactive, Zero Trust approach to cybersecurity has never been more urgent. One solution is rapidly [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":67932,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[],"class_list":["post-67931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Application Allowlisting Is Now Essential for CMMC Compliance<\/title>\n<meta name=\"description\" content=\"How DoD contractors can simplify security while meeting modern standards As cyber threats continue to evolve, traditional security tools like antivirus\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Application Allowlisting Is Now Essential for CMMC Compliance\" \/>\n<meta property=\"og:description\" content=\"How DoD contractors can simplify security while meeting modern standards As cyber threats continue to evolve, traditional security tools like antivirus\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-09T16:40:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T16:41:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Why Application Allowlisting Is Now Essential for CMMC Compliance\",\"datePublished\":\"2025-06-09T16:40:31+00:00\",\"dateModified\":\"2025-06-09T16:41:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/\"},\"wordCount\":455,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-4-1.jpg\",\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/\",\"name\":\"Why Application Allowlisting Is Now Essential for CMMC Compliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-4-1.jpg\",\"datePublished\":\"2025-06-09T16:40:31+00:00\",\"dateModified\":\"2025-06-09T16:41:07+00:00\",\"description\":\"How DoD contractors can simplify security while meeting modern standards As cyber threats continue to evolve, traditional security tools like antivirus\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-4-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-4-1.jpg\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Application Allowlisting Is Now Essential for CMMC Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Application Allowlisting Is Now Essential for CMMC Compliance","description":"How DoD contractors can simplify security while meeting modern standards As cyber threats continue to evolve, traditional security tools like antivirus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Why Application Allowlisting Is Now Essential for CMMC Compliance","og_description":"How DoD contractors can simplify security while meeting modern standards As cyber threats continue to evolve, traditional security tools like antivirus","og_url":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-06-09T16:40:31+00:00","article_modified_time":"2025-06-09T16:41:07+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4-1.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Why Application Allowlisting Is Now Essential for CMMC Compliance","datePublished":"2025-06-09T16:40:31+00:00","dateModified":"2025-06-09T16:41:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/"},"wordCount":455,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4-1.jpg","articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/","url":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/","name":"Why Application Allowlisting Is Now Essential for CMMC Compliance","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4-1.jpg","datePublished":"2025-06-09T16:40:31+00:00","dateModified":"2025-06-09T16:41:07+00:00","description":"How DoD contractors can simplify security while meeting modern standards As cyber threats continue to evolve, traditional security tools like antivirus","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4-1.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4-1.jpg","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/why-application-allowlisting-is-now-essential-for-cmmc-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Application Allowlisting Is Now Essential for CMMC Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=67931"}],"version-history":[{"count":2,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67931\/revisions"}],"predecessor-version":[{"id":67934,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67931\/revisions\/67934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/67932"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=67931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=67931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=67931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}