Contact Us
Contact Us
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Subscribe to our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Firewall Configuration and Rules Review

A firewall is the first line of defence against online attacks, making it a critical part of your network security strategy.

Read more
Complete this form to get in touch

Are you happy for Defendza to keep you informed on the latest developments in cyber security (attack reports, guidance, DIY articles)? Of course you can unsubscribe at any time. Please see our privacy policy

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Overview

In a networked environment, a firewall is the first line of defense. For organistions that do not deployed multi-layered security mechanisms, firewall protects your network traffic based on different categories (viruses, network floods, malicious URLs).

A firewall review involves checking the configuration of the device including review of rule base. During the review, Defendza consultants seek understanding of network design, firewall function, business requirements before the review. This helps in understanding and assessing the firewall configuration with a balanced view to keep into account realistic attack scenarios.

Why you need Firewall Configuration and Rules Review?

Network traffic allowed through the firewall must be in line with functional requirements. Defendza have experienced contrary situations where either service provider or customer's IT team have temporary changes, duplicate rules, large/excessive attack surfaces been allowed.

Whether it's business as usual review or after changes, it's important to find out weaknesses in your firewall configuration and rulebase to identify gaps. These gaps could aid an attacker to initiate unauthorised connections to outside systems in order to exfiltrate data, set up command and control channels or other malicious actions.

Methodology

Communication & Debrief

We take customer communication as seriously as reporting or assessment execution. We engage with customers during all stages, and ensure that customer contacts are up to date in the language they understand. Post engagement, a free debrief is conducted to help the customers understand the weaknesses and prepare a mitigation plan.

Reporting

The assessment-execution phase is followed by the analysis & reporting. Defendza performs analysis on the testing output, evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels. 

Firewall Ruleset Review

Firewall ruleset review involves understanding the traffic flows between different network segments. This process includes working on the following objectives:

  • ACL Configuration
  • Use of overly permissive rules, duplicate rules, large source/destination or service addresses 
  • Use of clear-text protocols/services
  • Logging and Auditing 

Firewall Configuration

A firewall configuration review checklist concentrates around the following areas:

  • Secure configuration areas such as firmware versions, management protocols configuration, file tranfers/remote administration protocols
  • Firewall User Management
  • Logging and auditing practices
  • Administrative Interface Restrictions

 

Lets talk about your security requirements 
Call Us Now

Why Defendza ?

Thorough Analysis and Reporting

Our reports are comprehensive and include all the evidence that supports our findings. We give you a risk rating that considers how likely an attack is as well as the impact it could have. We don’t create panic scenarios. Our mitigation is detailed, covering both strategic and tactical areas to help our clients prepare a remediation plan.

Custom tools and scripts

Apart from the range of commercial and open source tools available for specific testing, our team has its own custom scripts for efficient testing. We provide accurate results to make sure our clients completely understand any vulnerabilities we report.

In-house experts

Our teams are led by veteran security consultants accredited by CREST standards for the last several years. Our experience shows that our clients are best served by giving them the right advice for their cyber security needs. We do not believe in spreading fear, uncertainty and doubt to generate more business.

Key Benefits

Our network security team is waiting
Call Us Now

Testimonials

"My experience to date with Defendza has been very positive, I look for a flexible, knowledable security "partner" when I engage a PT firm. Pentest means many things to many people and there are many different use cases for both the testing activity and the report generated and I need someone to work with me to get the absolute best value out of my security budget."

Information Security Officer
Insurance Group

Excellent people to work with. Very good knowledge of requirement and give us correct findings with excellent remedy to improve our security for our B2B portal site."

Head of Technical & Business Improvement
Leading Pharmaceutical Manufacturer

"I thought it was a highly professional and thorough exercise and I would have no hesitation recommending Defendza to any of my connections."

Director, Software Engineering
Global Information and Analytics Company

"Good personal service. We are delighted with the work Defendza did for us. Highly recommended."

CTO
Manchester headquartered Global Fashion Brand

"Extremely satisfied with approach, speed and end results. Thanks."

COO
International fashion label and store

"My experience of the Defendza team was 5 star.  They were so helpful, and their technical delivery and client communication were excellent."

Director, Software Development
Corporate Services Company

Resources

Manufacturers Can’t Afford the Cyber Risks

09/06/2019

Much of the manufacturing industry has failed to take proactive steps to defend against cyber attacks—which is a notable problem considering the growing threats the industry faces