Obtain an accurate understanding of your security and risk posture, while ensuring compliance with industry regulators and information security best practices.
Through Praetorian's firewall security examination, your organization can verify the soundness of your security architecture and determine how well it is aligned with various industry standard requirements such as PCI DSS, ISO/IEC 27001. During a firewall review, Praetorian will examine vendor specific vulnerabilities, ingress and egress access controls, logging and auditing, and system management. Firewall security reviews are important because they identify vulnerabilities that cannot normally be detected through network penetration tests and black box network assessments.
During the first phase of the assessment, Praetorian obtains an understanding of the overall security architecture and of the assets the firewall has been dedicated to protect. Developing an architectural understanding also allows Praetorian to evaluate the firewall in relation to optimal placement, regulatory compliance, and industry best practices.
During the next phase of the review, Praetorian examines the firewall configuration. Praetorian examines both the firewall's settings and rule sets to identify insecure configurations and loose access controls that would place the firewall and the assets it is designed to protect at risk. The assessment includes a review of firewall rules and groups, system & account management, access controls, and logging and auditing.
Finally, Praetorian will compare firewall interrogation results to documented firewall policies and procedures. In addition, firewall administrators will be interviewed to uncover any undocumented practices and clarify any discrepancies discovered.
During the review process, each firewall is reviewed and measured against a standard methodology and common security practices. Specifics will vary by firewall product, but the overall security considerations will remain the same.
Upon completion of the assessment Praetorian shall provide a single electronic report deliverable. The report will provide an analysis of the current state of the assessed security controls. The analysis will identify areas that need to be resolved in order to achieve an adequate level of security. The detailed contents of the deliverable are described below.
The report deliverable will include the following high level sections in a format suitable for management:
The report deliverable will also include the following in-depth analysis and recommendations for technical staff to understand the underlying risks and recommendations: