You are on page 1of 9

A - Research task for the

candidate
:
1. Research what sources could be used
for the engine. Pros and cons
• Application whitelisting can be based on a variety of application file and folder attributes, including the:
• File path.
• Filename.
• File size.
• Digital signature or publisher.
• Cryptographic hash.
• Process.

As the discussions above indicate, choosing attributes is largely a matter of achieving the right balance of security,
maintainability, and usability. Simpler attributes such as file path, filename, and file size should not be used by
themselves unless there are strict access controls in place to tightly restrict file activity, and even then there are often
significant benefits to pairing them with other attributes. A combination of digital signature/publisher and
cryptographic hash techniques generally provides the most accurate and comprehensive application whitelisting
capability, but usability and maintainability requirements can put significant burdens on the organization.
2. What would be different options to build the country based
whitelist. Provide at-least two suggestions with pros and cons
• Indexing Bot to get the list of the domains by country. It takes time to index everything, certain systems
may not allow indexing, so the data may not be fully collected.
• Uses third party indexed resource google or other. Using indexes from google or similar companies can
update data faster and get better results, but it can be expensive and the data can be incomplete.
• To avoid these problems with updates, most application whitelisting technologies offer maintenance
options. For example, many technologies allow the administrator to select certain services (e.g., patch
management software) to be trusted updaters. This means that any files that they add to or modify on a
host are automatically added to the whitelist. Similar options are available for designating trusted
publishers (i.e., software vendors), users (e.g., system administrators), sources (e.g., trusted network
paths), and other trusted entities that may update whitelists.
• Another option available with some application whitelisting technologies is the use of reputation
services. These services determine if a service, publisher, or other external entity is generally associated
with benign or malicious content. This allows application whitelisting software or links to make decisions
about how to handle new or modified files based on the reputation of the associated service, publisher,
etc., instead of simply adding them to a graylist for subsequent manual processing.
3. Suggest ways how to control ever growing exception
list, so whitelist (with exceptions) stays under 50MB

The whitelist can be built into the host operating system (OS), or


it can be provided by a third-party vendor. The simplest form of
whitelisting allows the system administrator to specify file
attributes associated with whitelisted applications, such as file
name, file path and file size.
4. What whitelist update frequency would
you suggest.
As new applications are added to the environment and existing applications are updated, there
may be technical difficulties in keeping whitelists updated in a timely manner, and significant costs
associated with maintenance. Certain types of whitelisting require more frequent whitelist
changes than others. However, the amount of maintenance needed must be balanced with the
effectiveness of the solution; a higher-maintenance solution that prevents more incidents may
actually be less expensive in the long term since it includes the cost to remediate incidents, versus
a lower-maintenance solution that has limited effectiveness in stopping threats.

There are two primary methods of generating an application whitelist for a host. One is to use
vendor provided information on the characteristics of known good applications, supplemented
with organization generated information on the characteristics of organization-specific
applications (i.e., in-house custom applications). The other method of generating an application
whitelist is to scan the files on a clean host to build a good known baseline.
B - Team management task for the
candidate:
1. How would you delegate this task? Would you do initial
research, would you assign a full task for somebody, would
you split, and if how?
• First, a meeting would be held and the general problem presented, its
possible theoretical solutions, and the NIST security requirements,
and possible solutions. Then break down each part of the task,
delegate each to different people. I would tell you to do common or
related tasks together, so that there is a common background.
2. What if team tells you - we don’t have the right
competence to suggest best ways. What do you do?
• I find someone to train them for the task and hire an outside
consultant to solve the problem. And that's what the team will learn,
that's what we need now. I would see if what I learned is combined
with the suggestions made by the consultant.
3. What if a team member comes back with the
result and you see that you know how to do it
better with some changes? What do you do?
What if the result is not satisfactory at all? And
you know how to do it right.
• I present my version and together we try to review which one is
better and more effective.

• I am presenting my version and am waiting for its confirmation or


denial, or new solutions.

You might also like