Supporting NERC CIP-005 R2
Requirement 2 of CIP-005 requires access controls at the electronic perimeter. I think most of us read it and see firewalls as a big part of the solution. However, there are implications beyond just...
View ArticleDetox Step 1: Remove the Technical Errors
Firewall policies are complex. Some firewall vendors try and reduce the complexity of administrating firewalls with graphical editors or zone-based administration and those concepts help. However,...
View ArticleDetox Step 2: Remove Unused Access
There is an old riddle about firewall management - Question: What goes in but never comes out? Answer: A firewall rule! Most organizations have well established methods and procedures for adding rules...
View ArticleDetox Step 3: Review and Refine
Firewall rules don’t get added because a security engineer thinks it would be fun to add a rule. They usually get added because there was a business demand for new access. And that request for new...
View ArticleThe Power of Extensible Audits
One of the most powerful features inside of FireMon is our ability to quickly add customized reports or audits to the application. This takes minutes and doesn’t even require “us” to do it. Our...
View ArticleDissecting Big Firewall Rules
A while back, I worked with one of our clients who was put in a tough spot by their external auditors. The auditor flagged every firewall rule that accepted traffic and used the “Any” object in the...
View ArticleImprove Firewall Performance & Security by Removing Unused Rules
Despite being one of the older security technologies, firewalls are still the most utilized network security control in the enterprise. As Gartner noted in its last Magic Quadrant, “firewalls have long...
View Article
More Pages to Explore .....