Onboarding Overview: Whitelisting
In order for Living Security's Human Risk Management Platform to work seamlessly in your environment, we require certain URLs and IP Addresses to be whitelisted to permit traffic to and from these services.
📚Overview
What is Whitelisting? A whitelist (allowlist) is a cybersecurity strategy that approves a list of email addresses, IP addresses, domain names or applications, while denying all others so that traffic from the allowed services and applications is not inhibited by cyber security tools and/or policies.
❓How can I best approach Whitelisting?
Each IT or Cybersecurity team has their own strategy on who they allow to be whitelisted, as well as policies around how to go about requesting services and applications to allow traffic to flow into and out of their organization's environment. When conducting whitelisting, your organization is increasing the risk your environment is exposed to. In order to minimize this risk, there is normally a comprehensive process to review what is being whitelisted and how much risk can be mitigated or acceptable when performing Whitelisting.
📆 Whitelisting is a recurring requirement for the lifecycle of your engagement with Living Security's HRM Platform. It is highly recommended that your organization review your whitelisting requirements quarterly to ensure that your organization proactively addresses any new cybersecurity tools or policies that may impact HRM functionality.
For a comprehensive breakdown of each service and what those services perform within our environment, please see our What Services are you Whitelisting? article.
✅ What does my Organization need to Whitelist?
Now that we were able to break down what whitelisting is, and what each service that empowers Living Security's HRM Platform functionality, your IT team can find a comprehensive table of URLs, IP Addresses and Ports to whitelist based on the services your organization is comfortable to grant web traffic flow for within your environment here.