Building and Maintaining Effective Firewall Configurations

Sep 11, 2013


Building and Maintaining Effective Firewall Configurations 

Perimeter defense will always be a hot-button topic in the security world, and for good reason: Perimeter defenses are our first and often most effective way to block an attack from reaching the internal network. And while deploying a robust perimeter defense isn’t rocket science, it’s not exactly child’s play, either. From both a strategic and operational perspective, effective perimeter security is a complex and constantly evolving animal. To do it right requires daily attention. 

Many enterprises fail to configure their firewalls properly when they are installed, or they fail to check and maintain those configurations as they change over time. As a result, many enterprises are left with major vulnerabilities in their defenses, and attackers are able to simply bypass the firewall to get the information they want. In this Dark Reading report, we discuss methods for configuring firewalls correctly in the first place, and for monitoring firewall configuration and change to ensure that new openings haven’t been created in enterprise defenses. (S7350913)


Research Report