Knowing How to Apply Mitigation Techniques or Controls to Secure an Environment
Should we find that we have a vulnerability, we need to take action to mitigate the risk, so let’s look at some of the techniques or controls that we can use.
Reconfigure Endpoint Security Solutions
When technologies change or we suffer a data breach, we might have to reconfigure the endpoint security solutions. We are going to look at these types of configurations in the following sections, starting with an application approved list
Application Approved List
We can use application whitelisting where the approved applications are listed. This means that if an application is not listed, it cannot be launched. Some devices such as pf-sense have Allowed Lists. For the purposes of the Security+ exam, if we want to prevent users from installing applications or prevent malware from installing, we will create a whitelist. Neither the unauthorized applications nor the malware will be on the...