Firewall Security Assessment

  • Home
  • Firewall Security Assessment

Firewall Security Assessment

Our network firewall assessment service is intended to ensure that the firewall configuration and rule set match the company’s business and regulatory needs.

Firewall technology performs a major role in enterprises of all kinds, creating trust and security boundaries inside your company and the network, as well as offering connection to workers and partners.

With both the rising complexity and capability available in next-generation firewalls and “virtual” firewalls, it is necessary to make sure that these are installed and effectively managed. Request a free consultation.

Following information obtained from the operational usage of the security device, a complete evaluation of the ruleset will be examined in accordance with the security infrastructure and the business supporting services.

Weak / outmoded firewalls may reveal redundant service details of the servers hosting enterprise applications, allowing an attacker to use the flaw after a violation

The network firewall evaluation will begin with a study of the business’s agreed-upon compliance and security policies.

Our expert will request that the customer provide documentation for examination. This will contain policies, appropriate updates, and firewall setup paperwork, as well as a project plan outlining the location of the firewall in scope for Cyber Breach Guard’s research.

This audit will be done in the manner of a white box audit.

Any documentation on the firewall setup, security protocols established, and any following change requests documentation must match the real current status of the network. Any differences in the paperwork will be presented as a finding as part of the evaluation.

The customer will also need to provide a copy of the firewall setup and rule base, preferably electronically.

If the firewall is supplied by a shared network operator, only business-specific rules must be given, as well as any generic rules. Rule sequencing and priority are also significant considerations, and this data should be supplied with any firewall rule base guidelines given.

  • Software version and patch level
  • Insufficiently restrictive rules
  • Permissive rules precede the deny all rule
  • Insufficient auditing
  • Insecure services used
  • Time synchronization
  • Security of VPN settings
  • Protections employed against common Denial of Service Attacks
  • Location of firewall within the network
  • Overlapping rules
  • Unused objects
  • Weak account passwords /password encryption used
  • Missing rules (e.g. a stealth rule)
  • Excessive user accounts/least privilege
  • Configuration of other modules

If a comprehensive policy and change requests document set is given for one network, a firewall security evaluation takes at least two days. Subsequent additional firewalls will indeed be assessed on a one-man-day basis per firewall.

Please allow a day per firewall if the network firewall evaluation consists solely of the firewall rule set and its implementation.

Want to know more? Just contact us today!