Segmentation - 2.5
Segmentation is the process of separating or isolating parts of the network for security purposes. This is often done to improve security and control over network traffic by limiting access to certain sections.
ACLs - Access Control Lists
- ACLs are used for allowing or disallowing network traffic based on predefined rules. They control access to networks by filtering traffic.
Application Allow / Deny Lists
- These lists are used to control which applications or software can run on a system by allowing or disallowing them.
- Allow Lists: Restrictive, as they require an application to be explicitly allowed in order to run.
- Deny Lists: Prevent specific applications from running. For example, certain antivirus software may use deny lists.
- Examples of List Criteria:
- Operating System (OS) Lists
- Application Hashes
- Certificates
- File Paths
- Network Zones