Building And Maintaining Effective Firewall Configurations

  /     /     /  
Publicated : 22/11/2024   Category : security


Building And Maintaining Effective Firewall Configurations


The best firewalls in the world can still be misconfigured. Here are some tips for keeping yours up to snuff



[The following is excerpted from Building and Maintaining Effective Firewall Configurations, a new report posted this week on Dark Readings
Perimeter Security Tech Center
.]
Much of the innovation were seeing in the perimeter security space today is happening in the areas of Web security and application intelligence, but advanced threats and intelligent malware arent the only threat vectors you need to account for. Your entire perimeter security strategy must be built upon a strong foundation, and that starts with the execution of certain basic firewall configuration best practices. You can have the best intrusion-prevention system (IPS) and Web security tools on the planet, but if your firewall is misconfigured or mismanaged, then you are living in a house built on top of a sinkhole.
Proper configuration and management of your firewalls is a trivial exercise for the experienced firewall admin. But even the best among us can make the occasional mistake that can open up an attack vector. On the other end of the spectrum, less-seasoned firewall admins can open up gaping holes in their defenses without even knowing it.
Operational and management issues that create real security holes are only magnified when large teams of security pros are co-managing a large number of firewalls. If youre fortunate enough to be an experienced firewall admin wholly responsible for your farm of corporate firewalls, then consider yourself extremely lucky. But in most cases, the responsibility of managing a large number of firewalls spread across many sites is shared among a team of security pros. And as with any co-managed system, the more cooks in the kitchen, the greater the likelihood of errors, mistakes or misconfigurations in the broth.
All too often, we concentrate our time and effort on making sure our advanced security tools are doing an effective job. And all too often, we fail to pay attention to a crack in the foundation that can surface as a result of security policy misconfiguration. Here are some of the gotchas, tools and best practices that should be considered to ensure that your firewalls provide a strong foundation for the rest of your perimeter security strategy.
Rule-Based Configuration
Building and maintaining an effective firewall configuration starts with your rule base. Whether youre unpacking a firewall for the first time or pushing a new security policy to an existing firewall for the 1,000th time, the way in which you configure your firewall rules can help make you extremely secure or extremely insecure. Its easy for anyone to grasp the concept of what a firewall needs to do from a rule perspective, but implementation is key to avoiding gaping holes in your defenses. Even veteran firewall pros can make mistakes here, especially when trying to manage unfamiliar firewall platforms.
There are several basic best practices that should be used in the day-to-day management of your firewalls from a rule-based configuration perspective.
Dont lose track of your deny-any rule.
When you unpack a new firewall and start building a security policy from scratch, its easy to visualize what hosts youre exposing to the Internet. However, that visualization gets infinitely more difficult when you have 300 rules in play.
Most enterprise-grade firewalls come with a deny-any rule base out of the box, and its important not to lose track of it. The deny-any rule is commonly referred to as the catch-all rule because it ensures that any traffic not specifically allowed is dropped. Firewall admins can run into trouble when they set this action to allow and fail to set it back, or when they fail to see that the default action is set to allow. Even more likely: They configure an allow-any rule prior to reaching the catch-all rule, which defeats the whole purpose of the catch-all rule.
Beyond that, its important not to be overly generous with the TCP/UDP services that you allow internal hosts access to on the Internet. If you are, then youre exposing your hosts to unnecessary risk of attack and/or malware infection.
To read more rules and tips for maintaining strong firewall configuration -- and for some easy-to-use controls you can add to your security policy --
download the free report
.
Have a comment on this story? Please click Add a Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Building And Maintaining Effective Firewall Configurations