Application Whitelisting is number one on the Australian Signals Directorate “Essential Eight” for good reason.  Consider that everything on a computing platform is essentially an “application” so it makes sense to control which ones are allowed to execute.  Explicitly allowed applications permit business as usual, safeguarding against malicious code and misuse of productivity tools whether intentional or accidental.  Successful implementation begins with an inventory of all applications which define your “Whitelist” and “Blacklist”.  We then define rules for general and specific applications to match roles and requirements.  Planning is crucial.  Testing is critical.  Management support and underpinning policies are obligatory.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s