Firewall Rule Set ReviewEnsure that your Firewall is providing the level of protection that you expect with a thorough RandomStorm Firewall Rule Set Review
Firewall Rule Set Review
A RandomStorm consultant led firewall review provides a thorough examination of the Firewall configuration within your organisation. The configuration of the Firewall is assessed through the rule set and any issues appertaining to the rule set are identified by the examining consultant.
These issues may include problems due to over zealous rules, historic rules, badly configured rules or rules that have been added to provide a work around that now should be removed.
Firewalls have evolved over time and procuring a Firewall review provides you with the peace of mind that your Firewalls are protecting you in the manner that you would expect.
Firewall Rule Set Review – Methodology
The methodology employed for RandomStorm rule set reviews has been built from years of industry experience in performing firewall rule set reviews.
The assessment is divided into five steps.
These five steps are:
- Client brief
- Configuration parsing for supported devices
- Configuration analysis
- Report creation
- Report presentation
The customer provides the configuration files for the firewalls to be reviewed and a completion date for the report is agreed.
The consultant parses the configuration to extract the required information from the configuration appertaining to generic device security issues, objects, and the rules applied on the firewall.
The consultant takes the parsed information and compares it to industry best practices for the device configuration and the rules that are applied on the firewall.
The consultant creates an in-depth report focussing on providing business needs driven solutions to any issues identified. The report consists of a comprehensive PDF written report and a separate presentation containing the key messages identified during the assessment.
The written PDF report and presentation are securely delivered to the customer. The consultant is available to answer any questions that the customer may have regarding the security review.
It may be necessary for the customer to request a follow up assessment after a given time period in order for the effectiveness of the remediation to be assessed.