Site icon Arbitrary Cognitive Expulsion

Firewall Rule Guidelines

Whilst reviewing my teams implementation plan I came across some ACL’s and Firewall Rules which I assume had been created some time ago and thence continually added too (by another group) as even from a quick glance it was clear that a lot of the rules didn’t where redundant, or blatantly incorrect.

It made me recall a simple document I had written a few years back which described my thoughts on guidelines or principles for firewall rule management thus thought it worth repeating here…

In addition to the above guidelines, the following guidelines should be considered and adhered too for firewalls that intersect the public Internet and the organizations network:

The following depicts how a firewall rule life-cycle may be managed:

My Recommendations:

Firewalls (yes even the ones which call themselves next gen firewalls) provide very course protection and thus should not be viewed as a complete security solution, especially those which are deployed at the boundary to the Internet.

Ideally they are coupled with other security controls to provide a more complete protection layer.

It is perhaps preferable to separate the more in-depth protocol analysis into another device to ensure that the firewall is not impacted by this function and to simplify its management as not all traffic that traverses it will require such in-depth analysis.

It is also recommended that the firewall rules are validated and tested periodically, preferably every quarter to ensure integrity, protection and adherence to the known state of configuration.

Finally it is recommended that the guidelines and firewall rule life-cycle described in this document above are implemented into change management and service life-cycle processes and policies.

Exit mobile version