Why is Application Whitelisting #1 on the ASD Top 35 Strategies to Mitigate Targeted Cyber Intrusions?

Since the creation of the Top 35 Strategies in February 2010, application whitelisting has always been ranked as the #1 most effective and essential control to prevent targeted cyber intrusions, Why?

  • Proactive Security Strategy

    Airlock removes the ability for attackers to execute malicious and unknown code.

    Therefore, significantly increasing the difficulty of attack, blocking never before seen malware and removing core tools that attackers need.

  • Configured Uniquely In Every Instance

    Each Airlock deployment results in a unique whitelist according to customer needs.

    Therefore, attackers are unable to test their attacks against Airlock before attacking your organisation, as your security is unique.

  • Complete File Visibility and Control

    Airlock verifies, monitors and records all file executions across the organisation.

    Therefore, significantly increasing the ability for organisations to understand, detect and respond to malicious activity.

No other security strategy provides these capabilities.

Airlock application whitelisting provides the most effective detection and prevention strategy possible.

No other security control on the Top 35 provides these capabilities, together they provide organisations with powerful protection and detection capabilities.

  • Anti-Virus is ranked #30 on the list downvote
    • Anti-Virus (Signature) based detection was developed for a different time and security climate;
    • Attackers have access to the Anti-Virus products designed to stop them;
    • Anti-Virus is a ‘one size fits all’ solution.

Airlock was created to make implementing and maintaining application whitelisting in an enterprise environment secure and easy to manage.

The Top 35 Strategies to Mitigate Targeted Cyber Intrusions is informed by the Australian Signals Directorates (ASD) experience in operational cyber security, including responding to serious cyber incidents and performing vulnerability assessments and penetration testing for Australian government agencies.

Source: The Australian Signals Directorate (ASD) – Top 35 Mitigation Strategies http://www.asd.gov.au/publications/Mitigation_Strategies_2014.pdf