From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Unlock the full course today
Join today to access over 24,500 courses taught by industry experts.
Isolation techniques
From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Isolation techniques
- [Instructor] There was a time in the not too distant past where attackers only needed to find one single weakness in order to compromise an entire application. That was before we had newer isolation techniques at our disposal. By isolating application components from one another, you can create a more stable and secure application. When you employ isolation techniques, you're essentially segmenting the app components from one another. They're still able to communicate with one another so the app can do what it was designed to do. You're just adding another layer of security around each component to reduce the risk of breakage or compromise. A few of the more common isolation techniques are sandboxing, virtualization, and containerization. When you sandbox an application, you create a self-contained environment where that app will run. This environment is logically separated from the target system on which the application is installed. Sandboxes restrict access to their environment…