Mechanisms exist to whitelist or blacklist applications in an order to limit what is authorized to execute on systems.