Firewall Security Review Services

Through Praetorian's firewall security examination, your organization can verify the soundness of your security architecture and determine how well it is aligned with various industry standard requirements such as PCI DSS, ISO/IEC 27001. During a firewall review, Praetorian will examine vendor specific vulnerabilities, ingress and egress access controls, logging and auditing, and system management. Firewall security reviews are important because they identify vulnerabilities that cannot normally be detected through network penetration tests and black box network assessments.

Methodology for Firewall Security Reviews

During the first phase of the assessment, Praetorian obtains an understanding of the overall security architecture and of the assets the firewall has been dedicated to protect. Developing an architectural understanding also allows Praetorian to evaluate the firewall in relation to optimal placement, regulatory compliance, and industry best practices.

During the next phase of the review, Praetorian examines the firewall configuration. Praetorian examines both the firewall's settings and rule sets to identify insecure configurations and loose access controls that would place the firewall and the assets it is designed to protect at risk. The assessment includes a review of firewall rules and groups, system & account management, access controls, and logging and auditing.

Finally, Praetorian will compare firewall interrogation results to documented firewall policies and procedures. In addition, firewall administrators will be interviewed to uncover any undocumented practices and clarify any discrepancies discovered.

During the review process, each firewall is reviewed and measured against a standard methodology and common security practices. Specifics will vary by firewall product, but the overall security considerations will remain the same.

What You Get

Upon completion of the assessment Praetorian shall provide a single electronic report deliverable. The report will provide an analysis of the current state of the assessed security controls. The analysis will identify areas that need to be resolved in order to achieve an adequate level of security. The detailed contents of the deliverable are described below.

The report deliverable will include the following high level sections in a format suitable for management:

  • Purpose of the engagement including project's scope and approach
  • Positive security controls that were identified
  • Tactical resolutions to immediately reduce risk in the environment
  • Strategic recommendations for preventing similar issues from recurring
  • An industry comparison based on consultancy experience and results from similar previous engagements

The report deliverable will also include the following in-depth analysis and recommendations for technical staff to understand the underlying risks and recommendations:

  • A technical description and classification of each vulnerability
  • Anatomy of exploitation including steps taken and proof in the form of screenshots
  • Business or technical risk inherent in the vulnerability
  • Vulnerability classification that describes the risk level as a function of vulnerability impact and ease of exploitation
  • Technical description of how to mitigate the vulnerability

Ready to get started?

Contact us at 1 (800) 675-5152 to get started with your Firewall Security Review needs, or request a callback by submitting the form below.