Managed Services

Application Ring-Fencing and Storage Control

In our previous edition of this newsletter, we had discussed how ZTNA (Zero Trust Network Access) can be used to whitelist applications so that your organization can have control over what applications are allowed to run on computers inside your network, thereby eliminating the threat of accidentally downloaded utilities with malicious software from causing havoc.
In this edition, we will discuss two (2) more layers of security which are: 1. Application Ring-Fencing and 2. Storage Control.
All three (3) cybersecurity strategies mentioned above have now become indispensable as criminals use multiple attack vectors to exploit application execution capabilities to deploy and run malicious payloads.
Application Ring-Fencing and Storage Control:
Application Ring-Fencing Modern applications do not run in isolation. They interact with other applications on the computer, often invoking and/or passing data to other applications on the same or even other computer systems. Ring-fencing limits the ability of a program to invoke other programs that may not be needed for normal users. A ubiquitous program like Microsoft Word may have hyperlink(s), that when clicked, will open a default browser and take the user to a website. However, Word also has capabilities to invoke PowerShell, which advanced computer users use to perform many administrative level functions using command line. Normal everyday user may not have any need for it. However, a Word document with malicious code embedded in it, when received and opened, could invoke PowerShell commands that could cause data to exfiltrate, modify registry settings, or even encrypt files using Adobe software’s ability to encrypt. Another example is remote desktop which is used by computer IT professionals to remote into other systems to fix issues. When 2 computers interact with each other in this manner, malicious payload copied on to clipboard from an infected system can easily transfer to the other thereby infecting the other system also. Through carefully planned ring-fencing, an organization can limit ability of program’s ability to interact with other unnecessary programs and make its computer systems more secure.

Storage Control – An organization can set up policies to allow certain applications to access only certain drives and folders. This will not prevent a user from downloading a Word document with malicious code, but it will limit the damage to severely to only those drives and folders to which Microsoft Word has been granted access permission. A strategy like this can severely limit a malicious payload like ransomware from accessing and encrypting all possible data files on the network.
ddadmin

Share
Published by
ddadmin

Recent Posts

“الصفحة غير موجودة الخبر من زاوية أخرى آذا

"الصفحة غير موجودة الخبر من زاوية أخرى آذارالتنبؤ 1xbet في المغرب التنبؤ 1xbet مجانا لجميع…

4 days ago

Map Showing Internet Casinos In Usa By State

Map Showing Internet Casinos In Usa By State"The Largest Casino Accommodations In The Us All…

5 days ago

How To Trick The Slot Machine In Order To Win: 7 Confirmed Method

How To Trick The Slot Machine In Order To Win: 7 Confirmed MethodsHow To Cheat…

5 days ago

En İyi Bahis Ve Online Casino Platform

En İyi Bahis Ve Online Casino PlatformuMostbet⭐️resmi Site Türkiye⭐️2500 Try Yeni Oyunculara 250 Ücretsiz DöndürmeContentMostbet'te…

5 days ago

Ozwin On Line Casino Login Welcome Offer You $2000 Play No

Ozwin On Line Casino Login Welcome Offer You $2000 Play NowOzwin Online Casino: A Hub…

5 days ago

Map Showing Internet Casinos In Usa By State

Map Showing Internet Casinos In Usa By State"The Largest Casino Accommodations In The Us All…

5 days ago