Application whitelisting: We can whitelist the applications we want to allow to run on our
environments, but it can also be compromised. We would whitelist against a trusted digital
certificate, a known hash or path and name, the latter is the least secure, an attacker can replace
the file at the path with a malicious copy.