An Introduction to Whitelisting

Application whitelisting effectively blocks unauthorized applications and code without the need for antivirus programs.

Aw 113130 Asifshahweb

Do corporate initiatives require you to patch and run antivirus applications on your control system server and workstations? As with many of our customers, corporate IT groups determine requirements for all systems across the organization. This is done with good intentions, but these groups often have little or no idea what happens inside the industrial workspace.

Many times, we work with organizations that have had the same systems in place for 10, 20 or even 30 years. This is understandable; these are extremely expensive and complex solutions that, when built, were top of the line. To retrofit a million-dollar batching line just because it is running Windows XP is unnecessary, especially when you spend all your money to update these systems and still produce the same amount of product at the end of the day.

所以,你会做什么呢?应用白名单是一个solution that effectively blocks unauthorized applications and code on servers, desktops and fixed-function devices. This centrally managed solution uses a dynamic trust model and innovative security features to thwart advanced threats without requiring signature updates or labor-intensive list management. It is ideal for end-of-life operating systems or software for which security patches are no longer being provided. Application control or application whitelisting are terms used interchangeably for the same solution.

The core function of application control is to prevent a foreign application from installing or running on an endpoint (server\desktop\laptop) other than those that are allowed or whitelisted. If a machine has a static purpose or functionality, it will have a finite number of applications running on it. Application control will watch and learn and, in turn, create a whitelist of these applications and its operations when running. When the machine is locked down, anything outside of the whitelist will not be allowed to run. With such protection in place, threats—including zero-day viruses—are easily contained, therefore eliminating the need for antivirus programs that consume precious CPU cycles and memory overhead.

If there is a need to update the machine with new applications or modify existing applications, the machine can be unlocked in a controlled environment and the necessary tasks can be completed at a scheduled time. Once the machine is locked down again, application control will learn the new or modified application files and append them to the whitelist, which will then be used to protect the machine.

Application whitelisting has a low overhead footprint that does not impact system performance, requires low initial and ongoing operational overhead, and works effectively in standalone mode. The product is designed to operate in network and firewall configurations. It can even operate on systems that are not connected to a network. The days of having antivirus programs installed and up-to-date are over: Enter application whitelisting.

Asif Shah is an MIT analyst withInterstates Control Systems Inc., a certified member ofControl System Integrators Association(CSIA). For more information about Interstates Control Systems, visit itsprofile on The Industrial Exchange.

More in Home