Application Isolation and Sandboxing

Application Isolation and Sandboxing refers to the technique of restricting the execution of code to a controlled and isolated environment (e.g., a virtual environment, container, or sandbox). This method prevents potentially malicious code from affecting the rest of the system or network by limiting access to sensitive resources and critical operations. The goal is to contain threats and minimize their impact. This mitigation can be implemented through the following measures:

Browser Sandboxing:

  • Use Case: Implement browser sandboxing to isolate untrusted web content and prevent malicious web pages or scripts from accessing sensitive system resources or initiating unauthorized downloads.
  • Implementation: Use browsers with built-in sandboxing features (e.g., Google Chrome, Microsoft Edge) or deploy enhanced browser security frameworks that limit the execution scope of active content. Consider controls that monitor or restrict script-based file generation and downloads commonly abused in evasion techniques like HTML smuggling.

Application Virtualization:

  • Use Case: Deploy critical or high-risk applications in a virtualized environment to ensure any compromise does not affect the host system.
  • Implementation: Use application virtualization platforms to run applications in isolated environments.

Email Attachment Sandboxing:

  • Use Case: Route email attachments to a sandbox environment to detect and block malware before delivering emails to end-users.
  • Implementation: Integrate security solutions with sandbox capabilities to analyze email attachments.

Endpoint Sandboxing:

  • Use Case: Run all downloaded files and applications in a restricted environment to monitor their behavior for malicious activity.
  • Implementation: Use endpoint protection tools for sandboxing at the endpoint level.
ID: M1048
Version: 1.3
Created: 11 June 2019
Last Modified: 09 May 2025

Techniques Addressed by Mitigation

Domain ID Name Use
Enterprise T1189 Drive-by Compromise

Browser sandboxes can be used to mitigate some of the impact of exploitation, but sandbox escapes may still exist.[1][2]

Other types of virtualization and application microsegmentation may also mitigate the impact of client-side exploitation. The risks of additional exploits and weaknesses in implementation may still exist for these types of systems.[2]

Enterprise T1611 Escape to Host

Consider utilizing seccomp, seccomp-bpf, or a similar solution that restricts certain system calls such as mount. In Kubernetes environments, consider defining Pod Security Standards that limit container access to host process namespaces, the host network, and the host file system.[3]

Enterprise T1190 Exploit Public-Facing Application

Application isolation will limit what other processes and system features the exploited target can access.

Enterprise T1203 Exploitation for Client Execution

Browser sandboxes can be used to mitigate some of the impact of exploitation, but sandbox escapes may still exist. [1] [2]

Other types of virtualization and application microsegmentation may also mitigate the impact of client-side exploitation. Risks of additional exploits and weaknesses in those systems may still exist. [2]

Enterprise T1212 Exploitation for Credential Access

Make it difficult for adversaries to advance their operation through exploitation of undiscovered or unpatched vulnerabilities by using sandboxing. Other types of virtualization and application microsegmentation may also mitigate the impact of some types of exploitation. Risks of additional exploits and weaknesses in these systems may still exist.[2]

Enterprise T1211 Exploitation for Defense Evasion

Make it difficult for adversaries to advance their operation through exploitation of undiscovered or unpatched vulnerabilities by using sandboxing. Other types of virtualization and application microsegmentation may also mitigate the impact of some types of exploitation. Risks of additional exploits and weaknesses in these systems may still exist. [2]

Enterprise T1068 Exploitation for Privilege Escalation

Make it difficult for adversaries to advance their operation through exploitation of undiscovered or unpatched vulnerabilities by using sandboxing. Other types of virtualization and application microsegmentation may also mitigate the impact of some types of exploitation. Risks of additional exploits and weaknesses in these systems may still exist. [2]

Enterprise T1210 Exploitation of Remote Services

Make it difficult for adversaries to advance their operation through exploitation of undiscovered or unpatched vulnerabilities by using sandboxing. Other types of virtualization and application microsegmentation may also mitigate the impact of some types of exploitation. Risks of additional exploits and weaknesses in these systems may still exist. [2]

Enterprise T1559 Inter-Process Communication

Ensure all COM alerts and Protected View are enabled.[4]

.001 Component Object Model

Ensure all COM alerts and Protected View are enabled.[4]

.002 Dynamic Data Exchange

Ensure Protected View is enabled.[4]

Enterprise T1027 .006 Obfuscated Files or Information: HTML Smuggling

Use Browser Extensions or Built-in Security Tools that:

  • Monitor JavaScript API calls such as Blob, URL.createObjectURL, and msSaveOrOpenBlob
  • Intercept and analyze HTML5 download attributes for suspicious payload generation
  • Alert or block behaviors that match known HTML smuggling patterns (e.g., blob-to-disk payload construction)

Apply Content Security Policy (CSP) headers to:

  • Restrict inline JavaScript and dynamic script generation
  • Disallow downloads from unauthorized sources or blob URIs
  • Prevent cross-origin resource sharing (CORS) abuse commonly used in smuggling chains

Enable or enforce enterprise browser security controls, such as:

  • Endpoint's Network Protection and Attack Surface Reduction (ASR) rules, which can block Office and browser processes from creating child processes or writing to disk in suspicious ways
  • Google Chrome Enterprise Policies, which can control file download behavior, restrict extensions, and isolate risky browsing environments

Deploy browser sandboxing solutions that can isolate JavaScript execution environments and enforce behavioral policy restrictions

.017 Obfuscated Files or Information: SVG Smuggling

Browser sandboxes can be used to mitigate some of the impact of exploitation, but sandbox escapes may still exist.

Enterprise T1021 .003 Remote Services: Distributed Component Object Model

Ensure all COM alerts and Protected View are enabled.[4]

References