4.4 Mitigation Techniques and Controls

Endpoint Security Configuration

There are many ways to exploit a system such as OS vulnerabilities, malware, and user inteventions.

Any application can be dangerous to the system. Using approved list can be a security measure which restricts what kind of applications can be run in the system. On the other hand, blocklist/deny list can be used to prevent an application from running.

Decisions made in the OS, applications can be run with a unique hash, allow digitally signed application from publishers, running certain applications in certain paths, applications can be run from specific network zone


Security Configurations

Mobile Device Manager (MDM)

Data Loss Prevention (DLP)

Content filter/URL filter - block known malicious sites, limit access to untrusted websites

Isolation - isolate a compromised device from everything else from the network

Containment - run each application in its own sandbox, limit interaction with the host OS and other apps

Segmentation - separating the network into segments, putting internet facing services into different segment than servers that are in private network

Last updated

Was this helpful?