- Jul 5, 2016
- 416
We've got secured clients with egress limitations.
What that means is - XYZ corporation has their internal structure. DNS/DHCP/AD environment, maybe 3,4,5 or so Hypers running this or that. On-Prem AV server on one of the Hypers serving local signature updates to security programs. Then additionally, they have egress restrictions in place. 'You can go to these 100 websites only. Period. End of story'. Those 100 websites were ones deemed absolutely necessary for the operation of the day to day business of the secured facility. End of story. Firms that do this aren't going to get infected from any external source under almost all conditions. With further GP's of USB restrictions and/or hotglue shot into the USB ports that vector is now closed. Toss an active APT appliance on the network behind the UTM, RogueAP Suppression unit and you are good to go.
Egress restriction or egress monitoring is the foundation of strong security and security facilities. Any potential attacker is very limited in getting in, but more importantly getting out!
What is the e-mail setup like or are they not allowed to use e-mail?