Cybersecurity is a complex field that requires constant attention; keeping current on a myriad of evolving attack types, selecting and adopting constantly-changing technology, and so on. The need to stay up to date even extends to the choice of a security model, such as a negative security model.
The traditional approach to cybersecurity has been based on a Web Application Firewall (WAF), and historically, they have used a negative security model. Throughout the years, negative security has served an important purpose, but today, positive security models and even hybrid models are getting more attention.
But what is a negative security model, and is it still worth pursuing for your cybersecurity strategy?
A negative security model assumes that:
The model allows all HTTP/S requests to go through by default. Requests are not disallowed unless they are identified as being hostile.
This is why the negative security model is sometimes referred to as a “blacklist” model. With it, it is necessary to blacklist undesirable traffic; you must define threat signatures and other means of identifying hostile traffic before that traffic can be blocked.
The negative security model is still praised by some IT experts because of its simplicity and its effectiveness. It can protect against a wide variety of online threats, and you can set rules for blocking traffic based on known parameters for hostile and suspicious requests. And because most WAFs work at least partially by using negative security, it’s easy to setup and implement.
That said, there are also some disadvantages, and they are no longer adequate for a comprehensive security plan today.
For example:
Because of the disadvantages above, it’s tempting to think that the positive security model is inherently better than the negative security model. But while the ‘whitelisting approach’ compensates for many of the negative security model’s weaknesses, it also comes with some downsides of its own.
For example:
As we’ve seen, while the negative security model is highly effective in some regards, it also has critical limitations that could render your organization vulnerable to external threats. At this same time, while a positive security model has distinct advantages, it’s also much harder and more resource-intensive to implement.
The best approach is therefore to pursue a hybrid security model. A negative security model can provide a first line of defense, identifying and defeating the most obvious threats. Then a positive security model can catch the new or more sophisticated threats that slip through.
Do you have any questions about which security concept might be the best solution? Our security experts will be happy to answer all your questions at any time.