{"id":31,"date":"2018-10-30T15:55:10","date_gmt":"2018-10-30T14:55:10","guid":{"rendered":"https:\/\/lars-hilse.de\/lhx18\/?p=31"},"modified":"2018-10-30T09:12:23","modified_gmt":"2018-10-30T08:12:23","slug":"why-its-a-good-idea-to-isolate-eol-applications-software-with-insufficient-patches-and-how-to-do-it","status":"publish","type":"post","link":"https:\/\/lars-hilse.de\/lhx18\/2018\/10\/why-its-a-good-idea-to-isolate-eol-applications-software-with-insufficient-patches-and-how-to-do-it\/","title":{"rendered":"Why it\u2019s a good idea to isolate EOL applications\/software with insufficient patches, and how to do it"},"content":{"rendered":"<div class=\"ttr_start\"><\/div><p>Software and applications are the Achilles&#8217; heel of the information technology; when they reach end of life which is inevitable, or when they are not updated in high enough frequency, protocol suggests to stop using them altogether.<\/p>\n<p>However, a lot of applications are mission critical for an organization.<\/p>\n<p>In this case, and as I have seen and applied in the wild, one of the ways to continue using them is to isolate them from the rest of the network.<\/p>\n<p>Isolating specific pieces of software or applications from the rest of your IT environment is by running them inside dedicated virtual machines there by cutting them off from most of the rest of the network.<\/p>\n<div class=\"ttr_end\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Software that it\u2019s not regularly updated presents at risk. However, sometimes it is out of our influence whether or not a software remains up to date. If the software vendor does not provide updates and patches in time, and option to deal with such situations is to isolate software in virtual machines etc.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2,8,13],"tags":[18,10,19,16,17],"class_list":["post-31","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-global-risks","category-risk-management","tag-end-of-life","tag-infosec","tag-quarantine","tag-software","tag-vulnerability"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paluiP-v","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts\/31","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":3,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts\/31\/revisions"}],"predecessor-version":[{"id":37,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts\/31\/revisions\/37"}],"wp:attachment":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/media?parent=31"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/categories?post=31"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/tags?post=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}