Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Whitelist (Allowlist)

A security approach that permits only explicitly approved items while denying everything else by default.

A whitelist, also known as an allowlist, is a security mechanism that operates on the principle of default deny: only items explicitly listed as approved are permitted, and everything else is blocked. This approach is applied across many security domains including input validation, network access control, application execution policies, and email filtering. Whitelisting is considered a stronger defensive strategy than blacklisting because it does not require anticipating every possible malicious input or behavior.

How It Works

In input validation, a whitelist defines the set of acceptable characters, patterns, or values for a given input field. Rather than trying to identify and block every dangerous character (a blacklist approach), the application only accepts input that matches the expected format. For example, a phone number field might only accept digits, hyphens, and parentheses, automatically rejecting any input containing script tags, SQL keywords, or other unexpected characters without needing explicit rules for each attack type.

Network whitelisting restricts connectivity to a defined set of approved IP addresses, domains, or ports. A server that only needs to communicate with specific APIs can be configured to block all outbound connections except those to the approved endpoints. This significantly reduces the impact of server-side request forgery (SSRF) and other attacks that attempt to make the server connect to attacker-controlled resources.

Application whitelisting controls which programs are allowed to execute on a system. Only software that appears on the approved list can run, preventing malware, unauthorized scripts, and rogue applications from executing even if an attacker manages to place them on the system. This approach is particularly effective in controlled environments like point-of-sale systems, kiosks, and critical infrastructure endpoints.

Why It Matters

Whitelisting provides fundamentally stronger security than blacklisting because it eliminates entire categories of attacks rather than playing catch-up with individual threat variations. During security assessments, evaluating whether an application uses whitelist-based validation reveals the maturity of its defensive approach. Applications that rely on blacklists are consistently easier to bypass because attackers only need to find one pattern the blocklist missed.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment