Are Your Firewalls Ready for Summer?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Are Your Firewalls Ready for Summer?-6 Next

Step #5 – Identify excessive permission rules

Simplicity is the key. In the case of a firewall, we need to make sure we only allow what is absolutely necessary. 

Strive to adhere to the least privileged principle for firewall management. That is, grant only the necessary amount of access required. Review your rule policy to identify rules that might be excessively permissive, making sure to align with industry best practice. For example, you might want to remove rules with 'any' in more than one field, or that contain too many ports.

Beach season is officially here! If you want to spend more time this summer paying attention to the barbeque than your firewalls – then it's time to get your firewalls in shape! A bloated firewall rule set will slow down firewall performance and hide security issues, making it difficult to track down access violations and availability issues. That means more risk that you'll spend Saturday in the data center instead of manning the grill.

It might be too late to obtain six-pack abs before hitting the beach, but these six simple steps, provided by Skybox Security, will help guarantee you can relax this summer without worrying about your firewall.

Headquartered in San Jose, California, Skybox Security provides powerful risk analytics for cyber security, giving security management and operations the tools they need to eliminate attack vectors and safeguard business data and services. Skybox solutions provide a context-aware view of the network and risks that drives effective vulnerability and threat management, firewall management, and continuous compliance monitoring.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.