Devise a list of authorized software and version that is
required in the enterprise for each type of system, including
servers, workstations, and laptops of various kinds and uses.
This list should be monitored by file integrity checking tools to
validate that the authorized software has not been modified.