?
Solved

Best practises for security policies.

Posted on 2011-02-12
7
Medium Priority
?
837 Views
Last Modified: 2012-06-27
Hi
i am looking for examples or samples for a security polices that can be applied on any firewall and IPS.
is there any helpful site or documents.


cheers.
0
Comment
Question by:besmile4ever
6 Comments
 
LVL 5

Assisted Solution

by:rysic
rysic earned 300 total points
ID: 34878477
0
 

Author Comment

by:besmile4ever
ID: 34881399
Hi
dear what about the IPS?
as I can see it is totaly about the firewall...

Cheers.
0
 
LVL 18

Accepted Solution

by:
liddler earned 900 total points
ID: 34895634
Here are a few:
:
1) Know exactly what you will allow through and what traffic your system(s) produce
2) understand if you can white- or black-list ISPs, countries, traffic types
3) Aim for as few rules as possible, have business owners for each rule
4) Review rules regularly
5) review all logs to tweak rules to remove chatter / false positives
6) Understand any rate limiting capabilities and understand how to adjust them in the event of future traffic growth or how to decrease them in the event of an attack
7) Keep device patched up-to-date
0
A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

 
LVL 19

Expert Comment

by:CoccoBill
ID: 34895822
Get the CIS Cisco Firewall benchmark from the Center for Internet Security: http://cisecurity.org/en-us/?route=downloads.benchmarks. the latest version is 2.2.0 and it is a free download. It includes best practices for firewall management and configuration, use it as the basis for creating the policy.
0
 
LVL 65

Assisted Solution

by:btan
btan earned 300 total points
ID: 34931685
Can check out the answer in this and I have included some tools in my reply in it as well
@ http://www.experts-exchange.com/Networking/Security/Q_26562192.html
0
 

Author Closing Comment

by:besmile4ever
ID: 34932459
thnks.
0

Featured Post

Get quick recovery of individual SharePoint items

Free tool – Veeam Explorer for Microsoft SharePoint, enables fast, easy restores of SharePoint sites, documents, libraries and lists — all with no agents to manage and no additional licenses to buy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question