Skip to content

Blacklist Strategies

Blacklist strategies are designed for minimal operational impact:

  • Default = ALLOW
  • DENY only a limited set of high-risk ports/paths

They are ideal as a first step to reduce common attack paths without enforcing a full allow-list model.


1) Blacklist Dangerous Ports

This strategy denies a set of high-risk ports often used for discovery, legacy services, or lateral movement.

Blacklist Dangerous Ports

Key idea

  • Most traffic remains ALLOWED by default
  • Only blacklisted ports are DENIED broadly

Example dangerous ports (illustrative)

  • TCP/135
  • TCP/445
  • TCP/3389
  • UDP/69
  • UDP/161

Note

The exact list should be adapted to your environment and threat model. Start small, validate impact, then iterate.


2) Blacklist Admin Ports

This strategy reduces lateral movement by restricting administrative access paths and forcing admin access through controlled entry points.

Typical admin ports: - SSH (22) - RDP (3389) - WinRM (5985/5986) - Other admin/remote management ports (context-dependent)

Blacklist Admin Ports

Key idea

  • Default posture is still ALLOW
  • Admin ports are DENIED broadly
  • Admin ports are ALLOWED only via controlled jump hosts / admin zones (example: CyberArk / PAM)

What the diagram illustrates

  • ALLOWED (green):
  • Administrator → Hardened Admin WorkstationCYBERARK (PAM / Jump) → Applicative Server
  • DENIED (red):
  • Standard User Workstation → Applicative Server (direct admin ports blocked)

Tip

Use this when you want to prevent common pivot techniques and ensure admin access is restricted to approved paths.


When to use Blacklist strategies

  • You need fast risk reduction with minimal policy complexity
  • You want to eliminate obvious pivot paths early (admin ports, dangerous legacy ports)
  • You want a transitional strategy before deploying Intrazone or Fine-grained controls

Warning

Default ALLOW is not least privilege. Blacklist strategies are typically a step toward more explicit control models.