Whitelisting, blacklisting, and greylisting control IT access through their respective principles of explicit trust, distrust, and quarantining.
Also known as allowlisting, denylisting, and tracklisting, respectively, these cybersecurity principles apply broadly throughout information technology (IT) and can help manage a wide range of threats across assets and sources.
We will explore the pros, cons, and use cases for each technique, in brief in the chart below and then in greater depth.
Technique | Security type | Default Setting | When to Use | Main Drawback |
---|---|---|---|---|
Whitelist (aka: Allowlist) | Trust-centric | Always Deny | Strictly limit access to known good sources | Difficult to maintain |
Blacklist (aka: Denylist) | Threat-centric | Always Allow | Block known malicious sources | Never-ending process |
Greylist (aka: Tracklist) | Threat-centric | Quarantine, then investigate | Quarantine potentially malicious sources | Can block legitimate sources |