Knowing How to Apply Mitigation Techniques or Controls to Secure an Environment
Should we find that we have a vulnerability, we need to take action to mitigate the risk, so let's look at some of the techniques or controls that we can use. We might have to reconfigure the endpoint security solutions. We are going to look at applications.
Application Approved List
We can use application whitelisting where the approved applications are listed. This means that if an application is not listed, it cannot be launched. Some devices such as pf-sense have Allowed Lists.
Application Block List/Deny List
We can blacklist applications that are deemed dangerous, such as Kali Linux. If it is on the blacklist, it is totally banned and cannot be placed on the whitelist. Some devices such as pf-sense firewall have Block Lists.
Quarantine
If we find a device has been infected with a virus, we can remove it from the network by quarantining it. We can also use Network Access Control...