A list of applications lists all the software applications used within the system to operate as intended. This list may include server software, backend applications, desktop applications, and even supporting software that operates “behind the scenes”.
They want an application list so that they can assess the likelihood that their data will be properly handled and protected. Some applications may have vulnerabilities or know weaknesses. Also, some applications have known weaknesses or limitations that may call into question the ability to keep data protected.
They expect a list of all applications, including the application name and version number.