SlideShare a Scribd company logo
1 of 19
www.cyberoam.com
www.cyberoam.com
Our Products
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Network Security Appliances - UTM, NGFW (Hardware
& Virtual)
Modem Router Integrated Security
appliance
Implemented, Secured –
Now Let’s Audit the Firewall
Presenter:
Keyur Shah
Manager - Presales
www.cyberoam.com
Agenda
 Need of Firewall Audit
 Firewall Audit Procedures
 Evaluation Parameters and Best Practices
www.cyberoam.com
What necessitates firewall security audit?
 Firewalls are solely responsible for any good or bad traffic
 Exponential growth in networks, networking speed & devices, apps, web / cloud / virtualization
infrastructure has increased firewall complexity in terms of placement, rules and settings
 As many as 80% of firewalls examined in a recent data breach investigation were found poorly
configured!
 A quarter of UK and US businesses have had to re-do more than 60% of all firewall changes since they
were not implemented correctly the first time
www.cyberoam.com
Firewall Audit Procedure
 Baselines and Procedures
 Identification & Authentication
 Configuration
 Auditing and Administration
 Configuration Change Management
 Management & Monitoring
 Failover / Redundancy
 Findings and Recommendations
www.cyberoam.com
Baselines and Procedures
 Evaluation Parameter:
 Checking proper documentation for firewall
baseline and key firewall procedures
 Standards & Best Practices:
 Having a baseline for firewall helps
implement a security level that is
consistent across the organization
 Documented procedures relating to backup,
monitoring and incidence response reduces
manual dependency
www.cyberoam.com
Identification & Authentication
 Evaluation Parameter:
 Is the firewall being managed by third party personnel or by the
organization itself? If managed by third party, is it protected by
an NDA?
 Are all administrators authenticated using individual accounts
before granting access to the firewall's administration interface?
 What is the procedure for creating users/administrators?
 Are all administrator accounts assigned the lowest privilege
level that allows them to perform their duties?
 How often is the firewall configuration reviewed for presence of
unauthorized accounts?
www.cyberoam.com
Identification & Authentication
 Standards & Best Practices:
 Third Party personnel managing the firewall of an organization need to
sign an NDA with the later
 Maintaining individual accounts for each administrator helps implement
accountability for any malicious activity occurring intentionally or
unintentionally
 Procedures should address both creation as well as deletion of user
accounts for the firewall
 Administrators should be assigned the lowest privilege level that allows
them to perform their job
 Unauthorized accounts pose a serious threat to the overall security
posture of the organization
www.cyberoam.com
Configuration
 Evaluation Parameters:
 Is the firewall configured to be able to protect the network against denial of
service attacks such as Ping of Death, TCP SYN floods, etc.
 Is any sort of Ingress/Egress Filtering configured?
 Does the firewall use the latest version of the firewall software with all security-
related patches applied?
 How often is the firewall configuration rule sets tested in the form of a PT/VA?
 Are the firewall administrators registered with the vendors’ vulnerability mailing
list to keep themselves updated with the latest security patches?
 Does the firewall perform anti-virus scanning and content security checking of all
inbound packets for HTTP, FTP and SMTP?
 How is the performance of the firewall monitored? (memory , CPU)
 Are any VPNs configured on the firewall?
www.cyberoam.com
Configuration
 Standards & Best Practices:
 Rule sets should be tested every 6 months to a year
depending on the number of changes made to the
configuration file
 Firewall administrators should subscribe to vulnerability
mailing list pertaining to their firewall in order to be
aware of the latest vulnerabilities affecting their product
 As part of the capacity management procedure, periodic
reviews of the key parameters such as memory, CPU
should be monitored to address current and future needs
www.cyberoam.com
Auditing and Administration
 Evaluation Parameters:
 Are log recipient hosts identified
and configured?
 Is the security of the logs on the host
maintained through local OS settings?
 How often are the logs reviewed? Does
senior management receive status reports?
 Is logging timestamp enabled?
 Is the time synchronized with an NTP Server?
 Are logs reviewed/ monitored regularly?
www.cyberoam.com
Auditing and Administration
 Evaluation Parameters:
 Are the logs backed up? How often is the backup
taken? What is the retention period of the logs?
 Is the firewall configuration data backed up weekly
and / or whenever configuration changes occur?
 Where is the configuration data backup stored?
 Is the firewall configuration well documented?
 Is a login banner defined when accessing the firewall?
 Is the firewall configured to alarm the administrator
for a potential attack or system failure?
www.cyberoam.com
Auditing and Administration
 Evaluation Parameters:
 What is the procedure followed upon detection
of a particular incident?
 Is in-band management restricted to a limited
number of IP addresses?
 Is a local password assigned to the telnet or SSH
process?
 Is SNMP used to manage the firewall? If no, is the
service disabled?
 Is a time-out defined for idle sessions?
www.cyberoam.com
Auditing and Administration
Standards & Best Practices:
 Logging helps track incident
 The review of logs should be documented
and sent for manager’s review
 Including timestamps in messages allows
tracing network attacks more credibly
 Firewall configuration should be backed up
according to the firewall policy. (whenever a
configuration change takes place)
 The configuration files should be stored
either on tapes or a file server
www.cyberoam.com
Auditing and Administration
Standards & Best Practices:
 Well documented Firewall configuration
 Login banner should be defined on the
firewall
 A documented Incident Management
Procedure
 All management communication between
the management hosts and the firewall
should be encrypted
 The password should be stored in a manner
consistent site's security policy
 If the SNMP service, if not used , should be
explicitly disabled
www.cyberoam.com
Configuration Change Management
 Evaluation Parameters:
 Is there a documented change management
procedure for changes applied on the firewall?
 Standards & Best Practices:
 Since the application software change
management document addresses software
change management procedures, it should be
expanded to include networking devices such as
a firewall too.
www.cyberoam.com
Management & Monitoring
 Evaluation Parameters:
 Checking periodic review for firewall
configuration
 Is the firewall configuration (hard
copy) stored in a secured location?
 Checking whether firewall
administrator details (matrix)
document get updated
www.cyberoam.com
Failover / Redundancy
 Evaluation Parameters:
 Is the firewall configured for proper recovery
from failure or interruption?
 What is the procedure to be followed if the
firewall fails?
 Is the hot standby firewall in sync with active
firewall configuration and software updates?
 Is hot standby/recovery procedures of the firewall
periodically tested?
 Standards & Best Practices:
 HA should be configured, for firewall being a
critical device
 Availability of immediate backup firewall for
uninterrupted business continuity
www.cyberoam.com
Findings and Recommendations
Sr. No Findings / Recommendations
Implementation
Priority
1 The configuration file should be reviewed periodically to check for its accuracy. High
2
Logs should be stored on logging host which is hardened enough. High
3 Firewall is accessible from the whole network. A dedicated machine can be placed inside the
data center to which Admin can login and manage the Cyberoam and Layer-3 switches etc.
High
4
The review of logs should be documented and sent to the manager for review. High
5 Logs of the firewall should be backed up and retained. Log retention time period should be
defined.
Medium
6 As part of the capacity management procedure, periodic reviews of the key parameters such
as memory, CPU should be monitored on the firewall to address current and future needs.
Medium
7
Login banner should be defined on the firewall. Medium
8 A documented Incident Management Procedure should be available for alerts detected by
the firewall.
Medium
9
Firewall baseline and the procedures related to the firewall should be documented. Medium
10 Procedures should address the creation as well as the deletion of the user accounts created
on the firewall.
Low
11
Firewall configuration should be well documented. Low
www.cyberoam.com
Thank you
Contact: sales@cyberoam.com

More Related Content

What's hot

Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample ReportOctogence
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for EndpointCheah Eng Soon
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) securityNahidul Kibria
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configurationAlberto Rivai
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesrahul kundu
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationAlienVault
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Secure code practices
Secure code practicesSecure code practices
Secure code practicesHina Rawal
 
A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...Noppadol Songsakaew
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Web application security
Web application securityWeb application security
Web application securityKapil Sharma
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and UpdateCisco Canada
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 

What's hot (20)

Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample Report
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM Installation
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
Cross site scripting XSS
Cross site scripting XSSCross site scripting XSS
Cross site scripting XSS
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Web application security
Web application securityWeb application security
Web application security
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 

Similar to How to Audit Firewall, what are the standard Practices for Firewall Audit

Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slidesprojectwinner
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategykatharine300
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
E Com Security solutions hand book on Firewall security management in PCI Com...
E Com Security solutions hand book on Firewall security management in PCI Com...E Com Security solutions hand book on Firewall security management in PCI Com...
E Com Security solutions hand book on Firewall security management in PCI Com...Dolly Juhu
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueJan Robin
 
Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Jan Robin
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...ManageEngine, Zoho Corporation
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Merlin Govender
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Emmerick Gortz
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...ManageEngine, Zoho Corporation
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're InfectedTripwire
 

Similar to How to Audit Firewall, what are the standard Practices for Firewall Audit (20)

Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategy
 
ManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer trainingManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer training
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
E Com Security solutions hand book on Firewall security management in PCI Com...
E Com Security solutions hand book on Firewall security management in PCI Com...E Com Security solutions hand book on Firewall security management in PCI Com...
E Com Security solutions hand book on Firewall security management in PCI Com...
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
A075434624
A075434624A075434624
A075434624
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying Value
 
Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
 
Firewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East WorkshopFirewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East Workshop
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

How to Audit Firewall, what are the standard Practices for Firewall Audit

  • 1. www.cyberoam.com www.cyberoam.com Our Products © Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Network Security Appliances - UTM, NGFW (Hardware & Virtual) Modem Router Integrated Security appliance Implemented, Secured – Now Let’s Audit the Firewall Presenter: Keyur Shah Manager - Presales
  • 2. www.cyberoam.com Agenda  Need of Firewall Audit  Firewall Audit Procedures  Evaluation Parameters and Best Practices
  • 3. www.cyberoam.com What necessitates firewall security audit?  Firewalls are solely responsible for any good or bad traffic  Exponential growth in networks, networking speed & devices, apps, web / cloud / virtualization infrastructure has increased firewall complexity in terms of placement, rules and settings  As many as 80% of firewalls examined in a recent data breach investigation were found poorly configured!  A quarter of UK and US businesses have had to re-do more than 60% of all firewall changes since they were not implemented correctly the first time
  • 4. www.cyberoam.com Firewall Audit Procedure  Baselines and Procedures  Identification & Authentication  Configuration  Auditing and Administration  Configuration Change Management  Management & Monitoring  Failover / Redundancy  Findings and Recommendations
  • 5. www.cyberoam.com Baselines and Procedures  Evaluation Parameter:  Checking proper documentation for firewall baseline and key firewall procedures  Standards & Best Practices:  Having a baseline for firewall helps implement a security level that is consistent across the organization  Documented procedures relating to backup, monitoring and incidence response reduces manual dependency
  • 6. www.cyberoam.com Identification & Authentication  Evaluation Parameter:  Is the firewall being managed by third party personnel or by the organization itself? If managed by third party, is it protected by an NDA?  Are all administrators authenticated using individual accounts before granting access to the firewall's administration interface?  What is the procedure for creating users/administrators?  Are all administrator accounts assigned the lowest privilege level that allows them to perform their duties?  How often is the firewall configuration reviewed for presence of unauthorized accounts?
  • 7. www.cyberoam.com Identification & Authentication  Standards & Best Practices:  Third Party personnel managing the firewall of an organization need to sign an NDA with the later  Maintaining individual accounts for each administrator helps implement accountability for any malicious activity occurring intentionally or unintentionally  Procedures should address both creation as well as deletion of user accounts for the firewall  Administrators should be assigned the lowest privilege level that allows them to perform their job  Unauthorized accounts pose a serious threat to the overall security posture of the organization
  • 8. www.cyberoam.com Configuration  Evaluation Parameters:  Is the firewall configured to be able to protect the network against denial of service attacks such as Ping of Death, TCP SYN floods, etc.  Is any sort of Ingress/Egress Filtering configured?  Does the firewall use the latest version of the firewall software with all security- related patches applied?  How often is the firewall configuration rule sets tested in the form of a PT/VA?  Are the firewall administrators registered with the vendors’ vulnerability mailing list to keep themselves updated with the latest security patches?  Does the firewall perform anti-virus scanning and content security checking of all inbound packets for HTTP, FTP and SMTP?  How is the performance of the firewall monitored? (memory , CPU)  Are any VPNs configured on the firewall?
  • 9. www.cyberoam.com Configuration  Standards & Best Practices:  Rule sets should be tested every 6 months to a year depending on the number of changes made to the configuration file  Firewall administrators should subscribe to vulnerability mailing list pertaining to their firewall in order to be aware of the latest vulnerabilities affecting their product  As part of the capacity management procedure, periodic reviews of the key parameters such as memory, CPU should be monitored to address current and future needs
  • 10. www.cyberoam.com Auditing and Administration  Evaluation Parameters:  Are log recipient hosts identified and configured?  Is the security of the logs on the host maintained through local OS settings?  How often are the logs reviewed? Does senior management receive status reports?  Is logging timestamp enabled?  Is the time synchronized with an NTP Server?  Are logs reviewed/ monitored regularly?
  • 11. www.cyberoam.com Auditing and Administration  Evaluation Parameters:  Are the logs backed up? How often is the backup taken? What is the retention period of the logs?  Is the firewall configuration data backed up weekly and / or whenever configuration changes occur?  Where is the configuration data backup stored?  Is the firewall configuration well documented?  Is a login banner defined when accessing the firewall?  Is the firewall configured to alarm the administrator for a potential attack or system failure?
  • 12. www.cyberoam.com Auditing and Administration  Evaluation Parameters:  What is the procedure followed upon detection of a particular incident?  Is in-band management restricted to a limited number of IP addresses?  Is a local password assigned to the telnet or SSH process?  Is SNMP used to manage the firewall? If no, is the service disabled?  Is a time-out defined for idle sessions?
  • 13. www.cyberoam.com Auditing and Administration Standards & Best Practices:  Logging helps track incident  The review of logs should be documented and sent for manager’s review  Including timestamps in messages allows tracing network attacks more credibly  Firewall configuration should be backed up according to the firewall policy. (whenever a configuration change takes place)  The configuration files should be stored either on tapes or a file server
  • 14. www.cyberoam.com Auditing and Administration Standards & Best Practices:  Well documented Firewall configuration  Login banner should be defined on the firewall  A documented Incident Management Procedure  All management communication between the management hosts and the firewall should be encrypted  The password should be stored in a manner consistent site's security policy  If the SNMP service, if not used , should be explicitly disabled
  • 15. www.cyberoam.com Configuration Change Management  Evaluation Parameters:  Is there a documented change management procedure for changes applied on the firewall?  Standards & Best Practices:  Since the application software change management document addresses software change management procedures, it should be expanded to include networking devices such as a firewall too.
  • 16. www.cyberoam.com Management & Monitoring  Evaluation Parameters:  Checking periodic review for firewall configuration  Is the firewall configuration (hard copy) stored in a secured location?  Checking whether firewall administrator details (matrix) document get updated
  • 17. www.cyberoam.com Failover / Redundancy  Evaluation Parameters:  Is the firewall configured for proper recovery from failure or interruption?  What is the procedure to be followed if the firewall fails?  Is the hot standby firewall in sync with active firewall configuration and software updates?  Is hot standby/recovery procedures of the firewall periodically tested?  Standards & Best Practices:  HA should be configured, for firewall being a critical device  Availability of immediate backup firewall for uninterrupted business continuity
  • 18. www.cyberoam.com Findings and Recommendations Sr. No Findings / Recommendations Implementation Priority 1 The configuration file should be reviewed periodically to check for its accuracy. High 2 Logs should be stored on logging host which is hardened enough. High 3 Firewall is accessible from the whole network. A dedicated machine can be placed inside the data center to which Admin can login and manage the Cyberoam and Layer-3 switches etc. High 4 The review of logs should be documented and sent to the manager for review. High 5 Logs of the firewall should be backed up and retained. Log retention time period should be defined. Medium 6 As part of the capacity management procedure, periodic reviews of the key parameters such as memory, CPU should be monitored on the firewall to address current and future needs. Medium 7 Login banner should be defined on the firewall. Medium 8 A documented Incident Management Procedure should be available for alerts detected by the firewall. Medium 9 Firewall baseline and the procedures related to the firewall should be documented. Medium 10 Procedures should address the creation as well as the deletion of the user accounts created on the firewall. Low 11 Firewall configuration should be well documented. Low

Editor's Notes

  1. As findings from several surveys on enterprise network security reveal, lack of proper configuration for devices like Firewall allow unforeseen threats to penetrate and exploit corporate networks. A leading ICT analyst in the recent past reported that misconfigured network gear represents a major security threat. As per the analyst’s estimate nearly 65% of cyber attacks exploit misconfigured systems. Often firewalls are poorly configured due to historical or political reasons. Common firewall flaws include passing Microsoft Windows networking packets, passing rservices, and having trusted hosts on the business LAN. The most common configuration problem is not providing outbound data rules. This may allow an attacker who can sneak a payload onto any control system machine to call back out of the control system LAN to the business LAN or the Internet. And not just security, such errors / poor configurations also take toll on network performance, productivity and at times also cause frequent network outages, negatively impacting business continuity and hampering access to and availability of key business apps Here’s what needs to be remembered - The protection that firewalls provide is only as good as the policy they are configured to implement.
  2. Standards and Best Practices: 2nd point – Also makes the activity person independent
  3. Standards and Best Practices: 2nd point – Also makes the activity person independent
  4. Standards and Best Practices: 5th point –A regular review based on company policy helps eliminate the risk posed by unauthorized accounts.
  5. Standards and Best Practices: Last point –Logical/Physical controls need to be implemented on the file server to prevent unauthorized access
  6. Standards and Best Practices: 2nd point – This can aid in prosecution in some jurisdictions and also serves as a preventive measure to unauthorized access. 3rd point - A documented Incident Management Procedure should be available for alerts detected by the firewall.
  7. For e.g. to check the requirement and accuracy of access-lists. Logging is enabled by defining logging host; however this host is not connected to the network always. Further to strengthen the security only Admin system’s can have access to this system and this system should only be allowed to access certain ports (e.g. 80, 22, 23) on network devices only. This will prove useful if old logs have to be looked into to investigate a particular incident. This can aid in prosecution in some jurisdictions and also serves as a preventive measure to unauthorized access.