Section 20.189 Restricting Applications Flashcards

Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

Least Functionality

A

Involves configuring systems with only essential applications and services

■ Least functionality aims to provide only the necessary applications and services

Unneeded applications should be restricted or uninstalled to reduce vulnerabilities. Over time, personal computers accumulate unnecessary programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Managing Software

A

Keeping software up-to-date is crucial for security

■ New programs may be installed without removing old versions

■ Large networks require preventive measures to control excessive installations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure Baseline Images

A

A standardised wokrstation setup, including OS, essential applications and strict policies in corporate networks

Secure baseline images are used to install new computers. The Images include the OS, minimum required applications, and strict configurations

These images should be updated based on evolving business needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preventing Unauthorised Software

A

Application ‘allowlisting’ and ‘blocklisting’ are used to control which applications can run on a workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application Allowlisting

A

Only applications on the approved list are allowed to run

Similar to an “Explicit Allow” statement in access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Blocklisting

A

Applications placed on the blocklist are prevented from running

All other applications are permitted to run. Any application on the blocklist is denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Choosing Between Allowlisting and Blocklisting

A

Allowlisting is more secure, as everything is denied by default
Managing allowlists can be challenging as updates require list adjustments

Blocklisting is less secure, as everything is allowed except what’s explicitly denied
Managing blocklists can be difficult, as every new program variation would be
allowed until a rule is created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Centralised Management

A

Micrsosoft Active Directory Domain Controller: used to manage these list and deploy them through your group policies to your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly