incorrect - All Articles - CISO Platform2024-03-29T10:01:05Zhttps://www.cisoplatform.com/profiles/blogs/feed/tag/incorrectCommon Mistakes To Avoid While Configuring Your Firewallhttps://www.cisoplatform.com/profiles/blogs/common-mistakes-to-avoid-while-configuring-your-firewall2014-03-03T10:00:00.000Z2014-03-03T10:00:00.000Zprithahttps://www.cisoplatform.com/members/pritha<div><p><span class="font-size-4">Top Steps During Implementation Of A Firewall Project</span></p>
<ul>
<li>Clearly defined requirements such as type of firewall, architecture, performance requirements, compliance requirement, sizing, reporting, and minimum specifications are important for identifying suitable solution</li>
</ul>
<ul>
<li> Once right products are shortlisted, proof of concept or environment simulation will help finalize the product that is best fit to specific needs</li>
</ul>
<ul>
<li>Final preparation such as firewall architecture design, hardening, its placement, dependencies on other network and security equipment and policy rules are essential before starting with its implementation</li>
</ul>
<p>( Read more: <a href="http://www.cisoplatform.com/profiles/blogs/top-implementation-mistakes-key-learnings-while-implementing-proj">My Key Learning While Implementing Database Security</a> )</p>
<p> </p>
<p><span class="font-size-4">Top Implementation Mistakes Or Learning While Implementing A Firewall Project</span></p>
<ul>
<li> Improper capacity planning and incorrect zoning affects overall performance and quality of service</li>
<li> In depth testing prior to purchase of such solutions would eliminate surprises at the of implementation</li>
<li> Proper configuration of policies rules, audit and monitoring parameters helps get best out of such devices</li>
<li> Handing over process and detail knowledge transfer to operations team is important for proficient sustenance</li>
</ul>
<p></p>
<p><span class="font-size-4">Top Challenges Faced During Implementation</span></p>
<ul>
<li> Error in policy rules, policy rule conflicts or order of policies may make some systems or applications inaccessible</li>
<li> Improper design of zoning and configuration may expose critical vulnerabilities</li>
<li> Incorporating support for various applications needing dynamic ports</li>
</ul>
<p>( Watch more : <a href="http://www.cisoplatform.com/video/3-causes-of-stress-which-we-are-unaware-of">3 causes of stress which we are unaware of !</a> )</p>
<p></p>
<p><span class="font-size-4">Top Parameters Based On Which Success Of A Project Should Be Measured (specifically related to the above Domain)</span></p>
<ul>
<li> Below are the top parameters based on which the success of a project should be measured</li>
<li> Firewall rule set works as per requirements</li>
<li>Seamless & secure access to applications and compatibility across intra zones</li>
<li>Performance during pick and normal usage</li>
<li>Logging & data management as per organization compliance requirements</li>
<li>Vulnerability assessment and penetration testing giving positive results</li>
<li>Beside firewall policies, configuration of right security alerts, Incident Handling, Change Management, Firewall logs and auditing processes are also a key parameters for success of such implementations</li>
</ul>
<p></p>
<p><em>-Samir Dani , Dy. General Manager-IT at Suzlon Energy Ltd tells us about Top Steps and Learning in Firewall Projects</em></p>
<p>( More: <a href="http://www.cisoplatform.com/page/be-a-speaker">Want to become a speaker and address the security community?</a> <a href="http://www.cisoplatform.com/page/be-a-speaker">Click here</a> )</p></div>