Are Your Firewalls Ready for Summer?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Are Your Firewalls Ready for Summer?-5 Next

Step #4 – Remove shadowed and redundant rules

Efficiency is always the goal of IT security efforts, so it is important to make sure our firewall rules aren't duplicating efforts – remove shadowed and redundant rules. 

First let's start with terminology clarification:

  • Shadowed rules – broad rule is completely eclipsing a narrowly written rule further down the rule chain.
  • Redundant rules – rules that are unnecessarily duplicated. 

Shadowed and redundant rules can leave other critical rules unimplemented and impair firewall performance. You can identify shadowed and redundant rules with a logical analysis of the firewall's access rules.

Beach season is officially here! If you want to spend more time this summer paying attention to the barbeque than your firewalls – then it's time to get your firewalls in shape! A bloated firewall rule set will slow down firewall performance and hide security issues, making it difficult to track down access violations and availability issues. That means more risk that you'll spend Saturday in the data center instead of manning the grill.

It might be too late to obtain six-pack abs before hitting the beach, but these six simple steps, provided by Skybox Security, will help guarantee you can relax this summer without worrying about your firewall.

Headquartered in San Jose, California, Skybox Security provides powerful risk analytics for cyber security, giving security management and operations the tools they need to eliminate attack vectors and safeguard business data and services. Skybox solutions provide a context-aware view of the network and risks that drives effective vulnerability and threat management, firewall management, and continuous compliance monitoring.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.