By Charles Joseph | Cybersecurity Advocate
Last update: November 25, 2023
Table of Contents
show
A whitelist is a list of approved items for use or access. This is usually a list of IP addresses or authorized users.
Stay One Step Ahead of Cyber Threats
Want to Be the Smartest Guy in the Room? Get the Latest Cybersecurity News and Insights.
Key Points
- Maintaining a whitelist is a way to ensure that only approved people can access certain areas or information.
- It can be used as a security measure to protect data or resources.
- A whitelist can also be used to control who can access certain features or functions of an application or system.
- In some cases, a whitelist can also refer to a list of approved vendors or suppliers.
5 Reasons Why You Would Use a Whitelist
- To ensure that only authorized users can access a particular system or resource.
- To improve security by restricting access to only known and trusted users.
- To simplify security management by reducing the number of potential users that must be tracked and monitored.
- To reduce the risk of malicious activity by unknown or untrusted users.
- To comply with security policies or regulatory requirements that mandate the use of whitelisting.
QUOTE:
"Amateurs hack systems, professionals hack people."
-- Bruce Schneier, a renown computer security professional
"Amateurs hack systems, professionals hack people."
-- Bruce Schneier, a renown computer security professional