Allowlist
.png)
Allowlist Definition
An allowlist is a list of entities with explicit permission to access a system. It’s a security measure that manages access privileges for servers, networks, services, and other resources. Depending on the implementation, an allowlist can contain various identifiers, such as IP addresses, MAC addresses, user accounts, email addresses, or website domains.
How Allowlists Work
Allowlists follow the “default deny” principle. The security admins create a list of entities with access permissions. Whenever a user, program, or device tries to gain access, the system checks the allowlist. If the requester is on the allowlist, the system grants access. Anything not on the allowlist is automatically denied access. An allowlist can work on its own or be built into another security tool, such as a firewall.
Common Examples of Allowlists
- Application allowlist: Preapproved apps that can be installed or used on a device. Often used on workplace-issued devices.
- Email allowlist: Email addresses with permission to bypass spam filters and send emails to the user’s inbox.
- Server access allowlist: Trusted devices with access privileges to a network or a server, usually identified by an IP address or a MAC address.
- Website allowlist: Site domains that a user is allowed to browse. Typically applies to workplace networks or devices with parental controls.
Allowlist Benefits
- Increased security: Helps prevent unauthorized access and unknown software from running.
- Smaller attack surface: Limits what can run or connect, so it can stop many common threats before they start.
- Easier compliance: Helps keep the system in line with regulatory requirements in industries that require strict control over user access or software.
Read More
FAQ
No, but firewalls often have built-in allowlists. A firewall monitors incoming and outgoing traffic based on preset security rules. An allowlist is a defined list of entities that are allowed access to a network or resource. A firewall can be configured to deny all traffic by default and use an allowlist to only let through traffic from vetted sources.
Yes, absolutely. Allowlists are often used in combination with security measures like firewalls, antivirus software, access management, detection systems, and more. Many security mechanisms have some form of allowlist built in.
Allowlists work on a “deny by default; allow by exception” principle. The system only allows access to requesters on the allowlist; everyone else gets blocked. On the other hand, blocklists follow an “allow by default; deny by exception” principle, so the system only blocks access to requesters on the blocklist.