Firewall Audit Checklist WEB
Firewall Audit Checklist WEB
AUDIT CHECKLIST
SIX BEST PRACTICES FOR SIMPLIFYING FIREWALL
COMPLIANCE AND RISK MITIGATION
An AlgoSec Whitepaper
Ensuring Continuous Compliance
More regulations and standards relating to information security, such as the Payment Card Industry
Data Security Standard (PCI-DSS), the General Data Protection Regulation (GDPR), Sarbanes-Oxley
(SOX), Health Insurance Portability and Accountability Act (HIPAA), California Consumer Privacy Act
(CCPA) and ISO 27001, have forced enterprises to put more emphasis—in terms of time and
money—on compliance and the regular and ad hoc auditing of security policies and controls. While
regulatory and internal audits cover a broad range of security checks, the firewall is featured
prominently since it is the first and main line of defense between the public and the corporate
network.
The number of enterprises that are not affected by regulations is shrinking. But even if you do not
have to comply with specific government or industrial regulations and security standards, it is now
commonplace to conduct regular, thorough audits of your firewalls. Not only do these audits ensure
that your firewall configurations and rules meet the proper requirements of external regulations or
internal security policy, but these audits can also play a critical role in reducing risk and actually
improve firewall performance by optimizing the firewall rule base.
In today’s complex, multi-vendor network environments, typically including tens or hundreds of
firewalls running thousands of rules, completed a manual security audit now borders on the
impossible. Conducting the audit process manually, firewall administrators must rely on their own
experience and expertise—which can vary greatly across organizations—to determine if a given
firewall rule should or should not be included in the configuration file. Furthermore, documentation
of current rules and their evolution of changes is usually lacking. The time and resources required to
find, organize and pour through all of the firewall rules to determine the level of compliance
significantly impacts IT staff.
As networks grow in complexity, auditing becomes more cumbersome. Manual processes cannot
keep up. Automating the firewall audit process is crucial as compliance must be continuous, not
simply at a point in time.
The firewall audit process is arduous. Each new rule must pre-analyzed and simulated before it can
be implemented. A full and accurate audit log of each change must be maintained. Today’s security
staffs now find that being audit-ready without automation is impractical if not virtually impossible.
It’s time to look to automation along with the establishment of auditing best practices to maintain
continuous compliance.
The Firewall Audit Checklist
Below, we share a proven checklist of six best practices for a firewall audits based on AlgoSec’s
extensive experience in consulting with some of the largest global organizations and auditors who
deal with firewall audit, optimization and change management processes and procedures. While
this is not an exhaustive list that every organization must follow, it provides guidance on some
critical areas to cover when conducting a firewall audit.
• Review the procedures for rule-base change management. Just a few key questions to
review include:
o Are requested changes going through proper approvals?
o Are changes being implemented by authorized personnel?
o Are changes being tested?
o Are changes being documented per regulatory and/or internal policy requirements?
Each rule should have a comment that includes the change ID of the request and the
name/initials of the person who implemented the change.
o Is there an expiration date for the change?
• Determine if there is a formal and controlled process in place to request, review, approve
and implement firewall changes. This process should include at least the following:
o Business purpose for a change request
o Duration (time period) for new/modified rule
o Assessment of the potential risks associated with the new/modified rule
o Formal approvals for new/modified rule
o Assignment to proper administrator for implementation
o Verification that change has been tested and implemented correctly
• Determine whether all of the changes have been authorized and flag unauthorized rule
changes for further investigation.
• Determine if real-time monitoring of changes to a firewall are enabled and if access to rule-
change notifications is granted to authorized requestors, administrators and stakeholders.
3. Audit the Firewall’s Physical and OS Security
It is important to be certain as to each firewall’s physical and software security to protect against
the most fundamental types of cyberattack.
• Ensure that firewall and management servers are physically secured with controlled access
• Ensure that there is a current list of authorized personnel permitted to access the firewall
server rooms
• Verify that all appropriate vendor patches and updates have been applied
• Ensure that the operating system passes common hardening checklists
• Review the procedures used for device administration
• Identify any and all potentially “risky” rules, based on industry standards and best practices,
and prioritize them by severity. What is “risky” can be different for each organization
depending on the network and the level of acceptable risk, but there are many frameworks
and standards you can leverage that provide a good reference point. A few things to look
for and validate include:
o Are there firewall rules that violate your corporate security policy?
o Are there any firewall rules with “ANY” in the source, destination, service/protocol,
application or user fields, and with a permissive action?
o Are there rules that allow risky services from your DMZ to your internal network?
o Are there rules that allow risky services inbound from the Internet?
o Are there rules that allow risky services outbound to the Internet?
o Are there rules that allow direct traffic from the Internet to the internal network (not
the DMZ)?
o Are there any rules that allow traffic from the Internet to sensitive servers, networks,
devices or databases?
• Analyze firewall rules and configurations against relevant regulatory and/or industry
standards such as PCI-DSS, SOX, ISO 27001, NERC CIP, Basel-II, FISMA and J-SOX, as well as
corporate policies that define baseline hardware and software configurations to which
devices must adhere (See Figure 4 below)
• Document and assign an action plan for remediation of risks and compliance exceptions
found in risk analysis
• Verify that remediation efforts and any rule changes have been completed correctly
• Track and document that remediation efforts are completed
6. Ongoing Audits
Upon successful firewall and security device auditing, verifying secure configuration, proper steps
must be put in place to ensure continuous compliance.
Figure 2: AlgoSec provides network topology awareness with a map that provides visibility of all firewalls and
routers including all relevant interfaces, subnets and zones, and the ability to drill down to specific
information about each device.
Understand the Firewall Changes in Your Network – and Automate the
Process
AlgoSec intelligently automates the security-policy change workflow, dramatically cutting the time
required to process firewall changes, increasing accuracy and accountability, enforcing compliance
and mitigating risk. In addition, AlgoSec provides flexible workflows and templates to help you
manage change requests and tailor processes to your business needs.
Not only does this help you improve the performance and extend the life of your firewalls, it also
saves time when it comes to troubleshooting issues and IT audits.
“With AlgoSec we can now get, in thea click of a button, what took
two to three weeks per firewall to produce manually.”
Marc Silver, Security Manager, Discovery SA
About AlgoSec
AlgoSec simplifies, automates and orchestrates security policy management to enable enterprise
organizations and service providers to manage security at the speed of business. Over 1,800 of the
world’s leading organizations, including 20 of the Fortune 50, rely on AlgoSec to optimize network
security policy throughout its lifecycle, to accelerate application delivery while ensuring security and
compliance. AlgoSec is committed to the success of each and every customer, and provides the
industry’s only money-back guarantee.