Share

ASD Essential Eight Explained – Part 1: Application Whitelisting

The Essential Eight

In February of 2017, The Australian Signals Directorate (ASD) published an update to their “Top 4” Strategies to Mitigate Cybersecurity Incidents by revising the list to include four more crucial strategies. The “Essential Eight” has received considerable attention over the past several months although I have encountered many organisations that are unsure where to begin. In this series of brief articles, I will try to give you a bit of a kick-start to help you get going in the right direction. You are not alone…if you need help, please ask as we’re all on the same side!

The original ASD Top 4 included Application Whitelisting, Patching Applications, Restricting Administrative Privileges, and Patching Operating Systems. The Essential Eight now includes those four plus Disabling Untrusted Microsoft Office Macros, Using Application Hardening, Multi-Factor Authentication, and Daily Backups of Important Data. While the full ASD list contains 37, your focus should be on these eight before putting too much effort into the other 29.


Application Whitelisting

What is it?

I consider a firewall to be a Yes / No device when you strip away all of the “Next Generation” and Unified Threat Management (UTM) pieces. To some degree, Application Whitelisting works the same way by specifying which applications can execute (the Whitelist) leaving everything else implicitly or explicitly denied (the Blacklist). Granted, there will always be some that fall in the middle (the Greylist), but those should be reserved for administrative decision and not for the user to decide. By the way, make sure the aforementioned firewall also has a default “deny all” rule in place. I have seen many installations where the final rule was an “Allow All” with millions of hits against it.

Where do I start?

The first place to start should be understanding your information systems and which applications are needed to perform your business functions. If you don’t have this list already, please create it and engage a security specialist to help if needed. This will essentially become your “Whitelist”. It’s worth noting that not every team in your organisation will use the same list, there may be a core list (such as office applications) for everyone but different lists for other roles (such as Payroll and HR). Getting a handle on what applications you need and which you don’t want is crucial otherwise you can find yourself preventing good and allowing bad like a lousy B-grade superhero movie.

Any pitfalls?

Many, which is why I recommend getting the right people involved and this means more than just the IT team. Management also needs to support and sign off on this initiative. Having it as part of your information security / general IT policies is also recommended. You need to know exactly what applications are on your network and which ones are actually needed. It’s not an easy voyage, but one worth taking. At the heart of it, executing code is the cause of a lot of breaches. Also consider that it’s not always malware; sometimes your own tools and utilities can be used against you!

The ghost in the machine?

It’s us, plain and simple. At the end of the day, we just want to do our jobs, get paid, and go home to our families. Be ready to uncover shadow IT and related shadow data that often arise as a result of shortcuts (well-intended or otherwise) that we use to get the job done. Application Whitelisting can really help secure the environment, but be prepared for some resistance from the masses.

How do I make it work?

You probably already have the required hardware and software to make this a reality. Most modern endpoint protection applications, such as those from Symantec, Sophos, and McAfee have the ability to perform application whitelisting. Modern UTM firewalls that offer application control are not really “Whitelisting” but can add another layer of defence if you choose.

Am I missing anything?

Make sure you have the endpoint protection applied to every host that you can, and think beyond just workstations. Locking down the ability of applications to execute on your servers – especially database servers and web servers – can be an invaluable tactic.

How do I start?

It’s time to take stock and figure out what your business needs and what it doesn’t want. That comes down to what makes your business tick – the very applications you rely on.

Tags: Application Whitelisting, ASD Essential Eight, Cybersecurity, Network Security

Featured

Subscribe to our blog

Related

Email Security
Email: E for Error?

A number of years ago while on a family vacation, a younger member of the household that stayed behind was…

Q&A St Vincents Health
A new Era in Data Management:
Q&A with Cohesity and St Vincent’s Health Australia

Legacy data management environments are complex and siloed, leading to unnecessary expense and overheads that today’s IT teams simply don’t…

Data#3 recognised as a global finalist of 2021 Microsoft OEM Device Distributor/Reseller Partner of the Year

July 09, 2021; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced it has been named a…

Blog | Cohesity Use Cases
The modern use cases driving an evolution in data protection and recovery

In our previous post, we looked at what’s driving the increased interest in Cohesity and introduced a few use…

Customer Story: A Cisco Firepower Case Study

Cisco Firepower Strengthens Organisational Cybersecurity Defences Objective As a large organisation that places a high priority on IT security to…

Why Cohesity?
What’s driving the increased interest in Cohesity?

There has been a quiet evolution taking place in an area that often gets overlooked when it comes to technology…

Video: Cyber Maturity in Education Part 2
Cyber Maturity in Education Part 2

Practical steps to improve your School’s Security Posture Speaker Bio Logan Daley – Enterprise Security Architect, Australia & Pacific Islands,…

Video: Cyber Maturity in Education Part 1
Cyber Maturity in Education Part 1

Practical steps to improve your School’s Security Posture Speaker Bio Afzal Shariff – Director ICT Services, A.B. Paterson College Afzal…