Are Your Firewalls Ready for Summer?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Are Your Firewalls Ready for Summer?-7 Next

Step #6 – Count rule usage

Back to the firewall log ... use the trace data to find rules that are not used, or that are being partially used. These rules may be unnecessary and could be deleted. Or, they could potentially be subject to order of operations and may need to be elevated in the rule set. Rules that are being partially used may have hits, but indicate that they need to be trimmed. 

For example, we may find that a rule with 'any' in the destination field actually represents only a few addresses and should be replaced with a more narrowly defined rule. 

After you have completed these six steps, your firewalls will be in tip-top shape, ready to defend your network from threats so you can defend your beach chairs.

Beach season is officially here! If you want to spend more time this summer paying attention to the barbeque than your firewalls – then it's time to get your firewalls in shape! A bloated firewall rule set will slow down firewall performance and hide security issues, making it difficult to track down access violations and availability issues. That means more risk that you'll spend Saturday in the data center instead of manning the grill.

It might be too late to obtain six-pack abs before hitting the beach, but these six simple steps, provided by Skybox Security, will help guarantee you can relax this summer without worrying about your firewall.

Headquartered in San Jose, California, Skybox Security provides powerful risk analytics for cyber security, giving security management and operations the tools they need to eliminate attack vectors and safeguard business data and services. Skybox solutions provide a context-aware view of the network and risks that drives effective vulnerability and threat management, firewall management, and continuous compliance monitoring.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.