What is Application Whitelisting?

Application Whitelisting (AWL) is a security measure that allows only explicitly approved software or processes to run on a system. Anything not on the whitelist is automatically blocked.

In OT, AWL is a powerful defence against Malware, Ransomware and unauthorised scripts on systems such as SCADA, HMI and Engineering Station.


🧠 Why is AWL important in OT?

Risk without whitelisting Consequence
Malware via USB or updates Malicious code runs without detection
Unauthorised tools or scripts Shadow IT or exploits active on production systems
New, unknown attacks (zero-day) No AV signature = no blocking
Misuse of legitimate tools (LOLbins) PowerShell or WMI used for lateral movement

Many APTs and OT malware (such as TRITON and Industroyer) make use of legitimate tools. AWL prevents them from being executed.


🧩 How does Application Whitelisting work?

Step Description
Inventory Which applications are legitimate in the OT environment?
Build whitelist Add only approved files/hashes/signatures to the policy
Enforce policy Only whitelisted software runs; other executables are blocked
Logging and alerts Attempts to execute non-approved software are logged

🔧 Implementation methods

Method Explanation
Hash-based Only specific versions/files allowed (highest control)
Path-based Only execution from approved locations (faster, less secure)
Publisher-based Only signed software from trusted publishers
Combinations supported Balance between security and manageability

🛠️ Use in OT systems

System Whitelisting example
SCADA server Only official vendor software, logging tools, drivers
Engineering Station Only vendor-specific development environments, no browsers
HMI panel Only runtime and logging tools, no Office or scripts
Historian Only approved database services, no unknown connectors

✅ Best practices

  • Combine AWL with patch management and Antivirus
  • Apply default-deny: block everything except what is explicitly allowed
  • Start in audit mode for initial logging and tuning
  • Use SIEM to detect and log anomalies
  • Combine with USB Control to prevent unapproved software being introduced
  • Review the whitelist after system updates or MOC processes

⚠️ Considerations

Challenge Approach
Many software variants Use publisher- or hash-based combinations for flexibility
Legacy systems Apply AWL with exceptions for essential .exe files
Updates blocking themselves Verify Code Signing and run via trusted processes

📌 In summary

Application Whitelisting blocks unauthorised software, prevents Zero-day attacks and reduces human error. In OT environments with little change, AWL is particularly effective and manageable.