Best Practices and Recommendations

Standardize your security policies.

  • Includes firewalls, network zone relations, devices and users profiles, active services, etc...

Blocking all traffic by default.

Maintain documentation of firewall rules:

  • Purpose, relation to security policies, affected devices and users, deployment and expiration dates, and identification of the manager.

Maintenance and monitoring of rules.

  • Periodically verify the validity of rules within current security policies.

  • Analyze usage/match statistics of each rule.

Integrate flow control with existing rotting, switching, and load-balancing policies and services.

Last updated