Certainly we are no strangers to 
increased regulations, standards and internal policies, and the 
resulting audits that impact most organizations – often multiple times 
per year. 
While regulations and ensuing IT 
audits go beyond firewalls and firewall policies, these devices are 
often a good place to start when it comes to becoming "audit-ready" and 
gaining continuous visibility of what's going on in your network. 
Here are six steps to ensure you ace your next firewall audit: 
Step 1: Gathering Pertinent Information Before You Undergo an Audit 
Once 
you’ve gathered this information, it is imperative that you can 
aggregate and update this information in something better than a 
spreadsheet because you're most likely going to have multiple audits per
 year and spreadsheet compliance usually ends up badly. 
Step 2: Review Your Firewall Change Management Process 
Poor 
documentation of changes, including why the change is needed, who 
authorized the change, etc. and poor validation of the impact on the 
network are two of the most common issues when it comes to firewall 
change management. As time goes on, this challenge is exacerbated by 
staff turnover - that internal knowledgebase of why a change was made 
disappears and then you're left wondering what you should do – and poor 
documentation. Make sure you have regular reviews of the procedures for 
rule-base maintenance and that you can determine: 
• If there is a formal and controlled process in place to request, review, approve and implement firewall changes. 
• 
Whether or not all of the changes have been authorized. If you discover 
unauthorized rule changes, flag them for further investigation. 
• If 
real-time monitoring of changes to the firewall is enabled and access to
 rule change notifications is granted to authorized personnel. Taking 
these recommendations into account will get you off to a good start with
 solidifying your firewall change management processes and ensuring 
continuous compliance. 
Step 3: Audit Your Firewalls' Physical and OS Security 
Make 
sure you can define and enforce corporate baselines... and report 
against them so you know where you stand. By reporting against these 
baselines that you determine, you will always be "in the know" of your 
firewalls' configuration status and how they stack up to the policy. 
Ensure your firewalls and management servers are physically secured with
 controlled access and that the OS passes common hardening checklists. 
Step 4: Cleanup and Optimize Your Rule Base 
Over 
time, firewall policies have more and more rules added, removed and 
changed, and oftentimes with little documentation for the what, why, 
who, etc. This creates unnecessary overhead in the audit process and 
slows down firewall performance. Identify and remove unused rules and 
objects as well as covered rules, consolidate similar rules and tighten 
overly permissive rules (i.e. “ANY” in the source address). 
Step 5: Conduct a Risk Assessment and Remediate Issues 
When 
reviewing firewall rules and configurations, you want to be able to 
identify any potentially “risky” rules. What is “risky” can be different
 for each organization depending on the network and the level of 
acceptable risk, but there are many frameworks and standards you can 
leverage that provide a good reference point, in addition to your own 
definitions of course. Risky rules should be prioritized by severity.  
Once you've gone through your list of risk analysis questions, then it 
is time to document and assign an action plan for remediation of risks 
and compliance exceptions found in risk analysis. Once you've conducted 
remediation efforts, make sure you document those as well and verify 
that these efforts and any rule changes have been completed correctly. 
When it 
comes to your firewall configurations, building audit-readiness must be a
 business process that is maintained over time. "Manual" and "audits" 
just don’t mix. I've personally spoken to customers who prior to 
leveraging an automation tool spent 2-3 weeks to perform an audit of 
just ONE firewall, whereas with automation, that painstaking audit 
process was under a minute or as one customer told me "a push of a 
button". Additionally, proper documentation and a solid change process 
are instrumental pieces to ensuring audit-readiness at the drop of a 
hat. 
A final consideration is that while 
this article has focused on firewalls, there are different types of 
firewalls (traditional, next-generation, etc.) as well as secure web 
gateways, VPNs and other security devices typically found within an 
organization's network. Make sure that your audit process covers all of 
these devices as well. Good luck on your next audit.






0 komentar:
Posting Komentar
Silahkan mengirimkan komentar anda.