From the course: CSSLP Cert Prep: 4 Secure Software Implementation

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Isolation techniques

Isolation techniques

From the course: CSSLP Cert Prep: 4 Secure Software Implementation

Start my 1-month free trial

Isolation techniques

- [Instructor] There was a time in the not too recent past where attackers only needed to find one single weakness in order to compromise an entire app. That was before we had newer isolation techniques at our disposal. By isolating app components from one another, you can create a more stable and secure application. When you employ isolation techniques, you're essentially segmenting the app components from one another. They're still able to communicate with one another, so the app can do what it was designed to do. You're just adding an additional layer of security around each component to reduce the risk of breakage or compromise. A few of the more common isolation techniques are sandboxing, virtualization, and containerization. When you sandbox an application, you create a self-contained environment where the app will run. This environment is logically separated from the target system on which the app is installed.…

Contents