Explore application whitelisting as an effective method for preventing unknown software execution in this 47-minute Linux Foundation conference talk by Steven Grubb from Red Hat. Delve into an open-source implementation, examining various application execution methods and policy design. Learn how to leverage application whitelisting daemon information in real-time to maintain system integrity. Discover the broader security context and strategy, including Common Criteria Requirements, ATTACK to Kill Chain Mapping, and mobile code examples. Examine attack points, file access monitoring techniques, and access control policies. Gain insights into fapolicyd design, safety measures, and sources of trust. Watch a demo, analyze statistics reports, and understand fapolicyd coverage. Explore short-term improvements and the IDS Ensemble Model for a comprehensive understanding of application whitelisting in system security.