Practical Execution Control

Airlock Digital - Allowlisting Software

  • Home
  • Features
  • Blogs
  • Resources
  • FAQs
  • About us
  • Contact us

Airlock Digital - Allowlisting Software

  • Home
  • Features
  • Blogs
  • Resources
  • FAQs
  • About us
  • Contact us
Request a demo
Log in
Trust, in file based security
Back to Blogs

Trust, in file based security

12 Sep 2017

Trust, it’s a fundamental concept in cybersecurity and plays a vital role in the decisions we make, particularly if a risk based approach is taken to decision making. However, we don’t often think about how the concept of trust influences our decisions. This blog post will explore what role trust plays, in file based security.

First, it’s important to note that trust is not a one size fits all concept and is unable to be applied equally across situations. For example, trust between family members must be thought of as a completely different concept to trust between networked computer endpoints.

The oxford dictionary defines trust as:

Noun: “Firm belief in the reliability, truth, or ability of someone or something”.
Verb: “Allow someone to have, use, or look after (someone or something of importance or value) with confidence”.1

Looking at the above definitions, neither truly describes the concept of trust, when applied to files. Let me propose a more suitable definition (taking some inspiration from the Noun above):

“Firm belief in the purpose, origin and expected behavior of a file or software package”.

Let me clarify this statement. In order to decide if you should ‘trust’ a file you must satisfy the following criteria:

1) Context – The file must exist to serve a particular purpose and be attributable to an application or function. Humans should ask, why does the file exist?
2) Predictability – The file must behave in a predictable and consistent way when executed or handled. Humans should ask, does the file behave in a manner that is expected, given its context?
3) Integrity – The file must provide assurance that it has not been modified or tampered with in an unauthorized manner. Humans should ask, does the file have integrity?


Fig 1. Three domains of file trust

 

Answering these questions for every file on an average operating system can prove to be a daunting task, one that would simply be unfeasible using manual processes. Ultimately, we must rely on frameworks which can assist in determining if ‘trust’ should be placed in a file, at scale.

Frameworks can take many forms, such as a threat intelligence feed, hashing algorithm or even a digital certificate validation mechanism. Regardless of their function, these frameworks must be robust, as we rely upon them to provide accurate information to inform our decisions.

Now you may be thinking, what if I don’t fully ‘trust’ (have a firm belief in the reliability, truth or ability) the framework I am using? Where possible you should aim to use more than one framework to provide multiple answers for the ‘context’, ‘predictability’ and ‘integrity’ of a file. Multiple answers provide opportunity to compare the results across frameworks to ensure truthful answers are provided.

Typically, vendors/operators attempt to answer these questions using one or more of the following methods:

1) Context:

  • Has the file been seen by a large amount of users?
  • Has the file been signed by a vendor?
  • Is the file located in the correct path?
  • Does the file have a description explaining it’s purpose?

2) Predictability:

  • When is the file invoked?
  • Does the file perform any unexpected behaviors when invoked? (loading interpreters, spawning/hooking processes etc)
  • Does the file request elevated permissions?
  • Does the file load into the expected process?
  • Does the file perform any system modifications? Drop files?
  • Does the file extension match its content?

3) Integrity:

  • Is the file digitally signed by a vendor?
  • Does the files hash value match a vendor provided hash value?
  • Has the file changed hash values since I have seen the file?
  • Does the files hash match a known good sample based on threat intelligence?

These methods are not an exhaustive list and barely scratch the surface, but hopefully provide a starting point for some ideas which can be used to determine if you should trust a file or not.

Airlock Application Whitelisting provides a robust solution enabling administrators to easily choose which files they should trust in an environment. Most importantly, Airlock incorporates multiple frameworks which are needed to quickly determine trust.

Footnotes

1. https://en.oxforddictionaries.com/definition/trust

Share :
Next

Our Latest Blogs

1 Feb 2023
Airlock v5.1 & v5.0.9 avail...
This month we are excited to announce the release of two new versions of Airlock: Airlock v5.0.9: This version is the Long Term Support (LTS) branch ...
Read more
7 Dec 2022
Risky business – is the ke...
This week Airlock Digital sponsored the Risky Business podcast #688 and spoke to Patrick Gray about admin to kernel as a security boundary, and the li...
Read more
29 Sep 2022
Risky business – why micro...
In this Soap Box podcast Patrick Gray interviews Airlock Digital CTO Daniel Schell and CEO David Cottingham about Microsoft’s new Smart Application ...
Read more
31 May 2022
Risky business – vsto offi...
This week Daniel Schell discussed some research done in house at Airlock Digital on the Risky Business podcast, regarding VSTO office files. Check it ...
Read more
17 May 2022
Make phishing great again. vsto ...
This article can also be read on medium here: https://medium.com/@airlockdigital/make-phishing-great-again-vsto-office-files-are-the-new-macro-nightma...
Read more
22 Mar 2022
Risky biz soap box: why allowlis...
This week Airlock Digital co-founders Daniel Schell and Dave Cottingham join host Patrick Gray to talk about: What an effective allowlisting program ...
Read more
18 Jul 2021
Preventing ransomware and zero d...
Continued successful exploitation of the software supply chain As the world continues to assess the scope of the biggest global ransomware attack on ...
Read more

Airlock Digital Pty Ltd
Level 2/136 Greenhill Rd
Unley, SA 5061
Australia

  • About us
  • Blogs
  • Features
  • Resources
  • Contact us
  • FAQs

Newsletter Subscription

Subscribe to the Airlock Digital mailing list to be notified of the latest news and updates

© Copyright 2023 – Airlock Digital

Privacy Policy

Allowlisting: Reimagined