Top Steps During Implementation Of A Firewall Project

  • Clearly defined requirements such as type of firewall, architecture, performance requirements, compliance requirement, sizing, reporting, and minimum specifications are important for identifying suitable solution
  •  Once right products are shortlisted, proof of concept or environment simulation will help finalize the product that is best fit to specific needs
  • Final preparation such as firewall architecture design, hardening, its placement, dependencies on other network and security equipment and policy rules are essential before starting with its implementation

( Read more:  My Key Learning While Implementing Database Security )


Top Implementation Mistakes Or Learning While Implementing A Firewall Project

  •  Improper capacity planning and incorrect zoning affects overall performance and quality of service
  •  In depth testing prior to purchase of such solutions would eliminate surprises at the of implementation
  •  Proper configuration of policies rules, audit and monitoring parameters helps get best out of such devices
  •  Handing over process and detail knowledge transfer to operations team is important for proficient sustenance

Top Challenges Faced During Implementation

  •  Error in policy rules, policy rule conflicts or order of policies may make some systems or  applications inaccessible
  •  Improper design of zoning and configuration may expose critical vulnerabilities
  •  Incorporating support for various applications needing dynamic ports

( Watch more : 3 causes of stress which we are unaware of ! )

Top Parameters Based On Which Success Of A Project Should Be Measured  (specifically related to the above Domain)

  •  Below are the top parameters based on which the success of a project should be measured
  •  Firewall rule set works as per requirements
  • Seamless & secure access to applications and compatibility across intra zones
  • Performance during pick and normal usage
  • Logging & data management as per organization compliance requirements
  • Vulnerability assessment and penetration testing giving positive results
  • Beside firewall policies, configuration of right security alerts, Incident Handling, Change Management, Firewall logs and auditing processes are also a key parameters for success of such implementations

-Samir Dani , Dy. General Manager-IT at Suzlon Energy Ltd tells us about Top Steps and Learning in Firewall Projects

( More: Want to become a speaker and address the security community?  Click here )

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)