Best Practices and Recommendations
Standardize your security policies.
Includes firewalls, network zone relations, devices and users profiles, active services, etc...
Blocking all traffic by default.
Maintain documentation of firewall rules:
Purpose, relation to security policies, affected devices and users, deployment and expiration dates, and identification of the manager.
Maintenance and monitoring of rules.
Periodically verify the validity of rules within current security policies.
Analyze usage/match statistics of each rule.
Integrate flow control with existing rotting, switching, and load-balancing policies and services.
Last updated