
15
Chapter 2
Whitelisting
Sandy Bacik
Access control consists of permitting or denying the use of a particular resource. Within
networking environments, particularly at the network perimeter, enterprises have used blacklist-
ing. Blacklisting consists of banning a list of resources from access. As the unauthorized and
invalid access attempts increased, the blacklist continued to grow. is method allowed every-
thing unless explicitly denied, i.e., default allow. Enterprises are now doing the reverse, only allow-
ing authorized access, i.e., whitelisting, the “known good.” Whitelisting turns blacklisting upside
down, categorizing everything as ...