fbpx
Share

ASD Essential Eight Explained – Part 1: Application Whitelisting

The Essential Eight

In February of 2017, The Australian Signals Directorate (ASD) published an update to their “Top 4” Strategies to Mitigate Cybersecurity Incidents by revising the list to include four more crucial strategies. The “Essential Eight” has received considerable attention over the past several months although I have encountered many organisations that are unsure where to begin. In this series of brief articles, I will try to give you a bit of a kick-start to help you get going in the right direction. You are not alone…if you need help, please ask as we’re all on the same side!

The original ASD Top 4 included Application Whitelisting, Patching Applications, Restricting Administrative Privileges, and Patching Operating Systems. The Essential Eight now includes those four plus Disabling Untrusted Microsoft Office Macros, Using Application Hardening, Multi-Factor Authentication, and Daily Backups of Important Data. While the full ASD list contains 37, your focus should be on these eight before putting too much effort into the other 29.


Application Whitelisting

What is it?

I consider a firewall to be a Yes / No device when you strip away all of the “Next Generation” and Unified Threat Management (UTM) pieces. To some degree, Application Whitelisting works the same way by specifying which applications can execute (the Whitelist) leaving everything else implicitly or explicitly denied (the Blacklist). Granted, there will always be some that fall in the middle (the Greylist), but those should be reserved for administrative decision and not for the user to decide. By the way, make sure the aforementioned firewall also has a default “deny all” rule in place. I have seen many installations where the final rule was an “Allow All” with millions of hits against it.

Where do I start?

The first place to start should be understanding your information systems and which applications are needed to perform your business functions. If you don’t have this list already, please create it and engage a security specialist to help if needed. This will essentially become your “Whitelist”. It’s worth noting that not every team in your organisation will use the same list, there may be a core list (such as office applications) for everyone but different lists for other roles (such as Payroll and HR). Getting a handle on what applications you need and which you don’t want is crucial otherwise you can find yourself preventing good and allowing bad like a lousy B-grade superhero movie.

Any pitfalls?

Many, which is why I recommend getting the right people involved and this means more than just the IT team. Management also needs to support and sign off on this initiative. Having it as part of your information security / general IT policies is also recommended. You need to know exactly what applications are on your network and which ones are actually needed. It’s not an easy voyage, but one worth taking. At the heart of it, executing code is the cause of a lot of breaches. Also consider that it’s not always malware; sometimes your own tools and utilities can be used against you!

The ghost in the machine?

It’s us, plain and simple. At the end of the day, we just want to do our jobs, get paid, and go home to our families. Be ready to uncover shadow IT and related shadow data that often arise as a result of shortcuts (well-intended or otherwise) that we use to get the job done. Application Whitelisting can really help secure the environment, but be prepared for some resistance from the masses.

How do I make it work?

You probably already have the required hardware and software to make this a reality. Most modern endpoint protection applications, such as those from Symantec, Sophos, and McAfee have the ability to perform application whitelisting. Modern UTM firewalls that offer application control are not really “Whitelisting” but can add another layer of defence if you choose.

Am I missing anything?

Make sure you have the endpoint protection applied to every host that you can, and think beyond just workstations. Locking down the ability of applications to execute on your servers – especially database servers and web servers – can be an invaluable tactic.

How do I start?

It’s time to take stock and figure out what your business needs and what it doesn’t want. That comes down to what makes your business tick – the very applications you rely on.

Tags: ACSC Essential Eight, Application Whitelisting, Cybersecurity, Network Security

Featured

Related

Microsoft-JIT2023-S1-Amplification-Session-Blog-Card-04
Information protection in an age of information theft

Managing and safeguarding data across various apps, clouds, and endpoints is an uphill battle. It’s led to organisations relying on…

Customer Story: Knight Frank

Cloud Transition an Azure Success Story for Knight Frank Download Customer Story Contact a Specialist Objective…

3CX Desktop App Critical Vulnerability Alert

The Australian Cyber Security Centre has issued a warning about a new supply chain attack that has targeted a…

Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…