At Teceze, we carry out a broad range of reviewing firewall security reviews and providing firewall testing services. This requires us to audit the rule base and how it aligns with the industry's best practice. Utilizing a wide range of tools and scripts, we can carry out a detailed assessment on:
– Palo Alto.
Designing a firewall involves the following five steps:
1. Identifying your organisational security needs. This is achieved through identifying the security requirements, assessing your security stance and then working with this information to identify your security requirements.
2. Outline a complete security policy that involves network resources, access policies, and authorisation controls. This makes it possible for the firewall to address all security needs and expectations.
3. Defining and configuring the firewall is made easy by identifying resources, applications, and services that will be protected from any threats from external entities and insider attacks.
4. Identify acceptable communications through an acceptable use policy that defines the different network activities that are permitted or not permitted on the LAN and the internet web services.
5. Firewall design is made around identifying enforcement points. Firewalls are implemented at the edge of all networks and are positioned between private LAN and public networks.
Characterising the network, document the security stance and identifying the position of the business form a security perspective are all best practices.
Therefore you can:
1. Determine network resources and all security requirements
2. Spot known threats and understand how they should be dealt with
3. Document operating systems, versions and applications