Security Resources and Information from TechTarget 09月29日
应用安全模型选择指南
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

应用安全模型主要分为正则安全(白名单)和负则安全(黑名单)两种。正则安全通过允许已知安全的行为和流量来防御未知威胁,但管理复杂;负则安全则相反,通过阻止已知恶意行为来保护系统,实施简单但可能漏过新威胁。选择哪种模型取决于组织的具体需求,如数据敏感度、网络环境变化速度等。混合使用两种模型通常能提供更强的防护效果,例如先用黑名单过滤已知威胁,再用白名单确保安全行为。

🔍 正则安全通过白名单定义允许的行为和流量,拒绝所有其他请求,从而防御零日攻击和未知威胁。优点是安全性强,但实施复杂,需要持续更新允许列表以维持系统的灵活性。

🚫 负则安全通过黑名单定义禁止的行为和流量,允许所有其他请求,简化了初始部署但可能漏过未知的恶意活动。优点是实施简单且用户体验流畅,但面对新威胁时防护能力较弱。

🔄 混合模型结合了正则和负则安全的优点:先用黑名单阻止已知威胁,再用白名单确保合法行为,既能应对已知攻击又能防御未知风险,适用于需要高安全性和灵活性的组织。

📊 选择模型需考虑因素包括:数据敏感度(金融、医疗行业更倾向正则安全)、网络环境变化速度(快速变化的网络适合负则安全)、威胁检测需求(实时检测需灵活模型)等。

🔐 零信任架构常采用混合模型,仅授权用户访问应用并持续监控威胁,实现纵深防御。无论选择哪种模型,核心目标都是通过检测和缓解损害来降低恶意软件和其他威胁风险。

<p>An effective application security model is essential to protecting apps from threats and vulnerabilities. Two common models are positive security and negative security. While both approaches secure applications, they do so in different ways.</p><div class="ad-wrapper ad-embedded"> <div id="halfpage" class="ad ad-hp"> <script>GPT.display('halfpage')</script> </div> <div id="mu-1" class="ad ad-mu"> <script>GPT.display('mu-1')</script> </div> </div> <p>In general, positive security models only allow approved traffic and actions and deny other requests, and negative security models block known malicious traffic and actions and allow everything else.</p> <p>Let's compare positive and negative security for AppSec and examine how to choose which to implement.</p> <section class="section main-article-chapter" data-menu-title="What is positive security?"> <h2 class="section-title"><i class="icon" data-icon="1"></i>What is positive security?</h2> <p>Positive security models define what is allowed and disallow everything else. In terms of AppSec, positive security involves taking a default-deny approach by <a href="https://www.techtarget.com/whatis/definition/whitelist"&gt;allowlisting&lt;/a&gt; approved behaviors, traffic, services and entities for web apps and denying what is not explicitly allowed.</p> <p>The benefits of positive security for AppSec include the following:</p> <ul class="default-list"> <li>Prevents zero-day attacks because only allowed behavior and traffic is approved to interact with the web apps.</li> <li>Reduces false positives of unknown malicious behavior and traffic because it only allows approved inbound traffic and actions.</li> <li>Improves overall <a href="https://www.darkreading.com/cyberattacks-data-breaches/6-attack-surfaces-you-must-protect"&gt;attack surface</a> security because only approved behaviors and traffic are allowed.</li> </ul> <p>A top challenge of positive security is management complexity. Security teams need to regularly update allowlists to ensure legitimate and approved behaviors and traffic are permitted.</p></section> <section class="section main-article-chapter" data-menu-title="What is negative security?"> <h2 class="section-title"><i class="icon" data-icon="1"></i>What is negative security?</h2> <p>Negative security models define what is not allowed and permit everything else. In terms of AppSec, negative security involves taking a default-allow approach by <a href="https://www.techtarget.com/searchsecurity/tip/Allowlisting-vs-blocklisting-Benefits-and-challenges"&gt;blocklisting&lt;/a&gt; known bad behaviors, traffic, services and entities for web apps.</p> <p>The benefits of negative security include the following:</p> <ul class="default-list"> <li>Simplifies initial implementation because the focus is on preventing known malicious threats.</li> <li>Reduces UX friction because all traffic is allowed except that on the blocklist.</li> <li>Enables better flexibility for agile organizations because it does not prevent unknown good behaviors.</li> </ul> <p>A top challenge of negative security is that, because it only stops blocklisted behavior, new and unknown threats might slip past.</p></section> <section class="section main-article-chapter" data-menu-title="Comparing positive vs. negative security"> <h2 class="section-title"><i class="icon" data-icon="1"></i>Comparing positive vs. negative security</h2> <p>The goal of both models is to block unwanted traffic and behaviors and permit good traffic and behaviors. The differences are in how they handle traffic and behaviors.</p> <table class="main-article-table"> <thead> <tr> <td> <p><span style="color: #ecf0f1;"><b>Attribute</b></span></p> </td> <td style="width: 158.0pt;"> <p><span style="color: #ecf0f1;"><b>Positive security model</b></span></p> </td> <td style="width: 162.0pt;"> <p><span style="color: #ecf0f1;"><b>Negative security model</b></span></p> </td> </tr> </thead> <tbody> <tr> <td> <p>Primary activity</p> </td> <td valign="top" style="width: 158.0pt;"> <p>Permits only behaviors and traffic defined as safe; all others are blocked.</p> </td> <td valign="top" style="width: 162.0pt;"> <p>Blocks only behaviors and traffic defined as unsafe; all others are permitted.</p> </td> </tr> <tr> <td> <p>Technical approach</p> </td> <td valign="top" style="width: 158.0pt;"> <p>Default-deny using allowlists.</p> </td> <td valign="top" style="width: 162.0pt;"> <p>Default-allow using blocklists.</p> </td> </tr> <tr> <td> <p>Security</p> </td> <td valign="top" style="width: 158.0pt;"> <p>Considered more secure because it prevents unknown threats from passing through.</p> </td> <td valign="top" style="width: 162.0pt;"> <p>Considered somewhat less secure because unknown threats could pass through.</p> </td> </tr> <tr> <td> <p>Ease of use</p> </td> <td valign="top" style="width: 158.0pt;"> <p>More complex to implement; higher ongoing maintenance effort; more technical.</p> </td> <td valign="top" style="width: 162.0pt;"> <p>Simpler to implement; requires updates as new threats emerge; less technical.</p> </td> </tr> <tr> <td> <p>Pros</p> </td> <td valign="top" style="width: 158.0pt;"> <p>Strong security; limits attack surfaces; effective against sophisticated and unknown threats.</p> </td> <td valign="top" style="width: 162.0pt;"> <p>Simpler implementation and maintenance; preconfigured protections; reduces false positives.</p> </td> </tr> <tr> <td> <p>Cons</p> </td> <td valign="top" style="width: 158.0pt;"> <p>Resource-intensive; complex implementation; increased false positives.</p> </td> <td valign="top" style="width: 162.0pt;"> <p>Vulnerable to unknown and zero-day threats; increased false negatives.</p> </td> </tr> </tbody> </table></section> <section class="section main-article-chapter" data-menu-title="How to choose between positive and negative security models"> <h2 class="section-title"><i class="icon" data-icon="1"></i>How to choose between positive and negative security models</h2> <p>Either model can deter malware and other malicious activity in the right situation. When looking at positive and negative security models, first examine existing and prior trends in network traffic, user behaviors and security breaches and attacks. Determine which type of security model fits best within those parameters.</p> <p>Consider a positive security model in the following scenarios:</p> <ul class="default-list"> <li>The organization needs s<strong>trict</strong><strong> </strong><strong>control</strong> over device access, network access and system interactions.</li> <li>The organization uses apps and networks that access highly sensitive data, such as in banking, finance, healthcare and government.</li> <li>When understanding good behavior and traffic is more important.</li> <li>When the operating environment and infrastructure have predictable, known and understood users and activities.</li> </ul> <p>In the finance industry, for example, banks use positive security to validate customer transactions. It helps prevent fraud by ensuring only approved customers and transactions are permitted.</p> <p>Consider a negative security model in the following scenarios:</p> <ul class="default-list"> <li>The network environment and infrastructure are more fast-moving, requiring more flexibility and adaptability regarding web app access.</li> <li>The organization requires real-time <a href="https://www.techtarget.com/searchsecurity/definition/threat-detection-and-response-TDR"&gt;threat detection</a> without any limiting factors.</li> <li>When known threats and attacks frequently target the environment<strong>.</strong></li> <li>When the organization can quickly and easily update the rules for identifying and blocking suspicious signatures.</li> </ul> <p>Negative security works well for rapidly evolving apps, resource-constrained organizations and specific security measures -- for example, to identify and block known malware and ransomware variants.</p></section> <section class="section main-article-chapter" data-menu-title="Take a hybrid approach"> <h2 class="section-title"><i class="icon" data-icon="1"></i>Take a hybrid approach</h2> <p>In most cases, it's not a question of positive security <i>versus</i> negative security but positive security <i>and</i> negative security.</p> <p>Organizations should consider a hybrid approach to reap the benefits of both models. For example, use a negative security model as an initial prevention method to stop known malicious behaviors and traffic. Add positive security features to strengthen defensive efforts and prevent zero-day threats.</p> <p>Organizations that adopt a <a href="https://www.techtarget.com/searchsecurity/answer/What-are-the-most-important-pillars-of-a-zero-trust-framework"&gt;zero-trust security architecture</a> often use a hybrid model. This permits only authorized users to access an app while continuously monitoring for threat actors.</p> <p>Regardless of the approach, the goal of any AppSec model is to create a strong <a href="https://www.techtarget.com/searchsecurity/tip/How-to-build-an-application-security-program"&gt;application security program</a> that reduces malware, ransomware and other threats and vulnerabilities by detecting and mitigating damage before it occurs.</p> <p><i>Paul Kirvan, FBCI, CISA, is an independent consultant and technical writer with more than 35 years of experience in business continuity, disaster recovery, resilience, cybersecurity, GRC, telecom and technical writing. </i></p></section>

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

应用安全 正则安全 负则安全 白名单 黑名单 混合模型 零信任架构
相关文章