‘Ring fencing’ protects your computer, data

In the April issue of BIC, I discussed zero-trust security solutions that only allow approved applications to run. In this issue, I will discuss limiting the scope of what an approved application can do via a policy called "ring fencing." As Americans, we enjoy the greatest freedoms the world has to offer. We can do anything the law doesn't explicitly prohibit, but we do have laws. In addition, we cannot simply walk onto a secure government facility like Area 51 anytime we like.

However, an installed application, even an app that is trusted, can essentially do anything that is within its capabilities. It seems like trust should be a binary decision: Either we trust the application, which allows it to do whatever is within its capabilities, or we don't trust it, so we simply deny its ability to function altogether. Of course, the world is more nuanced than that, and your computer is a part of the world. Applications are similar to people in that we know them on a certain level, but we are not aware of what they are fully capable of doing. In reality, our applications have far more capabilities than most people utilize, yet if we look at what the vast majority of people do with common applications, we can limit applications' capabilities. Let's review a few examples of actions that we would commonly "ring fence" for an application to reduce its security risk.

In the world of computers, ignorance isn't bliss. Instead, our ignorance creates opportunities for criminal organizations to target our computers and data. Use a zero-trust security policy that includes ring fencing so you can be assured that your applications don't misbehave. In the next issue of BIC Magazine, we will discuss another zero-trust security policy called "anti-tampering."

For more information, visit www.omnipotech.com or call (281) 768-4308.

Back to topbutton