<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Layers of Defense in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Layers-of-Defense/m-p/123593#M22873</link>
    <description>&lt;P&gt;&lt;STRONG&gt;** Work in progress **&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Configuring a firewall to defend attacks and protect your network/assets means taking several layers of defense into account. It's not just the rulebase that makes up a firewall security. In fact there are many more layers of protection and defense that together build up a strong level of firewall security.&lt;/P&gt;
&lt;P&gt;These layers are often easy to deploy and set active, one just needs to know that they are available and ready to form your shield of protection.&lt;/P&gt;
&lt;P&gt;So let's start to list them all up.&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR bgcolor="lightgray"&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Layers of defense&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Field of security&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Protection&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Method of validation&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="69px" bgcolor="lightgreen"&gt;Layer 1&lt;/TD&gt;
&lt;TD width="25%" height="69px"&gt;Physical security&lt;/TD&gt;
&lt;TD width="25%" height="69px"&gt;secure space within a 19" rack in a secured spot only accessible to firewall admins&lt;/TD&gt;
&lt;TD width="12.5%" height="69px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="12.5%" height="69px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="478px" bgcolor="lightgreen"&gt;Layer 2&lt;/TD&gt;
&lt;TD width="25%" height="478px"&gt;Network security&lt;/TD&gt;
&lt;TD width="25%" height="478px"&gt;
&lt;UL&gt;
&lt;LI&gt;access to firewall management is controlled and secured by firewalls managed by this management (&lt;EM&gt;firewall self-protection&lt;/EM&gt;)&lt;/LI&gt;
&lt;LI&gt;firewall management's default gateway is the firewall cluster operated by this firewall management&lt;/LI&gt;
&lt;LI&gt;firewall management is defined as host and not as gateway&lt;/LI&gt;
&lt;LI&gt;firewall management is not connections to any other networks and has only only interface to it's own firewall cluster&lt;/LI&gt;
&lt;LI&gt;secure VPN configuration&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="478px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="12.5%" height="478px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="346px" bgcolor="lightgreen"&gt;Layer 3&lt;/TD&gt;
&lt;TD width="25%" height="346px"&gt;Gaia OS security&lt;/TD&gt;
&lt;TD width="25%" height="346px"&gt;
&lt;UL&gt;
&lt;LI&gt;allowed hosts&lt;/LI&gt;
&lt;LI&gt;personalized user accounts&lt;/LI&gt;
&lt;LI&gt;limited Clish shell as default Login shell&lt;/LI&gt;
&lt;LI&gt;password security controls&lt;/LI&gt;
&lt;LI&gt;strong cipher suites&lt;/LI&gt;
&lt;LI&gt;separate scp account&lt;/LI&gt;
&lt;LI&gt;login message&lt;/LI&gt;
&lt;LI&gt;session timeout&lt;/LI&gt;
&lt;LI&gt;backups /&amp;nbsp;snapshots&lt;/LI&gt;
&lt;LI&gt;ntp v4&lt;/LI&gt;
&lt;LI&gt;snmp v3-only&lt;/LI&gt;
&lt;LI&gt;etc.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="346px"&gt;Ransomware&lt;/TD&gt;
&lt;TD width="12.5%" height="346px"&gt;
&lt;UL&gt;
&lt;LI&gt;cat /etc/hosts.allow&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="346px" bgcolor="lightgreen"&gt;Layer 4&lt;/TD&gt;
&lt;TD width="25%" height="346px"&gt;Firewall security&lt;/TD&gt;
&lt;TD width="25%" height="346px"&gt;
&lt;UL&gt;
&lt;LI&gt;IP address spoofing protection&lt;/LI&gt;
&lt;LI&gt;block blacklisted IPs (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154" target="_self"&gt;&lt;EM&gt;sk103154&lt;/EM&gt;&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;block GEO locations (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126172" target="_self"&gt;&lt;EM&gt;sk126172&lt;/EM&gt;&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;firewall rulebase security&lt;/LI&gt;
&lt;LI&gt;inspection of encrypted protocols (&lt;EM&gt;such als HTTPS&lt;/EM&gt;)&lt;/LI&gt;
&lt;LI&gt;use of available security blades for deep packet inspection etc.&lt;/LI&gt;
&lt;LI&gt;IPS (with Snort)&lt;/LI&gt;
&lt;LI&gt;Content Security&lt;/LI&gt;
&lt;LI&gt;App. Control &amp;amp; URLF&lt;/LI&gt;
&lt;LI&gt;Anti-Bot, AV, etc.&lt;/LI&gt;
&lt;LI&gt;DLP&lt;/LI&gt;
&lt;LI&gt;TE, TX&lt;/LI&gt;
&lt;LI&gt;rulebase policy installation free of warnings and errors&lt;/LI&gt;
&lt;LI&gt;logfiles free of warnings and errors&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="346px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="12.5%" height="346px"&gt;
&lt;UL&gt;
&lt;LI&gt;check for "spoof" entries in log&lt;/LI&gt;
&lt;LI&gt;check for "&lt;EM&gt;DOS/Rate Limiting Policy&lt;/EM&gt;" entries in log&lt;/LI&gt;
&lt;LI&gt;enable session logging and check for "&lt;EM&gt;source country&lt;/EM&gt;" or "&lt;EM&gt;destination country&lt;/EM&gt;"&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="25px" bgcolor="lightgreen"&gt;Layer 5&lt;/TD&gt;
&lt;TD width="25%" height="25px"&gt;Admin security&lt;/TD&gt;
&lt;TD width="25%" height="25px"&gt;
&lt;UL&gt;
&lt;LI&gt;organizes regular firewall security reviews&lt;/LI&gt;
&lt;LI&gt;regularly reports to management&lt;/LI&gt;
&lt;LI&gt;maintains an up-to-date firewall documentation&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="25px"&gt;
&lt;UL&gt;
&lt;LI&gt;relics of configuration&lt;/LI&gt;
&lt;LI&gt;inconsistencies&lt;/LI&gt;
&lt;LI&gt;instabilities&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="25px" bgcolor="lightgreen"&gt;Layer 6&lt;/TD&gt;
&lt;TD width="25%" height="25px"&gt;End user security&lt;/TD&gt;
&lt;TD width="25%" height="25px"&gt;
&lt;UL&gt;
&lt;LI&gt;regularly receives IT-security awareness trainings&lt;/LI&gt;
&lt;LI&gt;is protected by a proper Endpoint security corp policy&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="25px"&gt;social engineering&lt;/TD&gt;
&lt;TD width="12.5%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Mon, 12 Jul 2021 11:38:34 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2021-07-12T11:38:34Z</dc:date>
    <item>
      <title>Layers of Defense</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Layers-of-Defense/m-p/123593#M22873</link>
      <description>&lt;P&gt;&lt;STRONG&gt;** Work in progress **&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Configuring a firewall to defend attacks and protect your network/assets means taking several layers of defense into account. It's not just the rulebase that makes up a firewall security. In fact there are many more layers of protection and defense that together build up a strong level of firewall security.&lt;/P&gt;
&lt;P&gt;These layers are often easy to deploy and set active, one just needs to know that they are available and ready to form your shield of protection.&lt;/P&gt;
&lt;P&gt;So let's start to list them all up.&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR bgcolor="lightgray"&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Layers of defense&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Field of security&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Protection&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD height="25px"&gt;&lt;STRONG&gt;Method of validation&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="69px" bgcolor="lightgreen"&gt;Layer 1&lt;/TD&gt;
&lt;TD width="25%" height="69px"&gt;Physical security&lt;/TD&gt;
&lt;TD width="25%" height="69px"&gt;secure space within a 19" rack in a secured spot only accessible to firewall admins&lt;/TD&gt;
&lt;TD width="12.5%" height="69px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="12.5%" height="69px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="478px" bgcolor="lightgreen"&gt;Layer 2&lt;/TD&gt;
&lt;TD width="25%" height="478px"&gt;Network security&lt;/TD&gt;
&lt;TD width="25%" height="478px"&gt;
&lt;UL&gt;
&lt;LI&gt;access to firewall management is controlled and secured by firewalls managed by this management (&lt;EM&gt;firewall self-protection&lt;/EM&gt;)&lt;/LI&gt;
&lt;LI&gt;firewall management's default gateway is the firewall cluster operated by this firewall management&lt;/LI&gt;
&lt;LI&gt;firewall management is defined as host and not as gateway&lt;/LI&gt;
&lt;LI&gt;firewall management is not connections to any other networks and has only only interface to it's own firewall cluster&lt;/LI&gt;
&lt;LI&gt;secure VPN configuration&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="478px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="12.5%" height="478px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="346px" bgcolor="lightgreen"&gt;Layer 3&lt;/TD&gt;
&lt;TD width="25%" height="346px"&gt;Gaia OS security&lt;/TD&gt;
&lt;TD width="25%" height="346px"&gt;
&lt;UL&gt;
&lt;LI&gt;allowed hosts&lt;/LI&gt;
&lt;LI&gt;personalized user accounts&lt;/LI&gt;
&lt;LI&gt;limited Clish shell as default Login shell&lt;/LI&gt;
&lt;LI&gt;password security controls&lt;/LI&gt;
&lt;LI&gt;strong cipher suites&lt;/LI&gt;
&lt;LI&gt;separate scp account&lt;/LI&gt;
&lt;LI&gt;login message&lt;/LI&gt;
&lt;LI&gt;session timeout&lt;/LI&gt;
&lt;LI&gt;backups /&amp;nbsp;snapshots&lt;/LI&gt;
&lt;LI&gt;ntp v4&lt;/LI&gt;
&lt;LI&gt;snmp v3-only&lt;/LI&gt;
&lt;LI&gt;etc.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="346px"&gt;Ransomware&lt;/TD&gt;
&lt;TD width="12.5%" height="346px"&gt;
&lt;UL&gt;
&lt;LI&gt;cat /etc/hosts.allow&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="346px" bgcolor="lightgreen"&gt;Layer 4&lt;/TD&gt;
&lt;TD width="25%" height="346px"&gt;Firewall security&lt;/TD&gt;
&lt;TD width="25%" height="346px"&gt;
&lt;UL&gt;
&lt;LI&gt;IP address spoofing protection&lt;/LI&gt;
&lt;LI&gt;block blacklisted IPs (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154" target="_self"&gt;&lt;EM&gt;sk103154&lt;/EM&gt;&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;block GEO locations (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126172" target="_self"&gt;&lt;EM&gt;sk126172&lt;/EM&gt;&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;firewall rulebase security&lt;/LI&gt;
&lt;LI&gt;inspection of encrypted protocols (&lt;EM&gt;such als HTTPS&lt;/EM&gt;)&lt;/LI&gt;
&lt;LI&gt;use of available security blades for deep packet inspection etc.&lt;/LI&gt;
&lt;LI&gt;IPS (with Snort)&lt;/LI&gt;
&lt;LI&gt;Content Security&lt;/LI&gt;
&lt;LI&gt;App. Control &amp;amp; URLF&lt;/LI&gt;
&lt;LI&gt;Anti-Bot, AV, etc.&lt;/LI&gt;
&lt;LI&gt;DLP&lt;/LI&gt;
&lt;LI&gt;TE, TX&lt;/LI&gt;
&lt;LI&gt;rulebase policy installation free of warnings and errors&lt;/LI&gt;
&lt;LI&gt;logfiles free of warnings and errors&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="346px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="12.5%" height="346px"&gt;
&lt;UL&gt;
&lt;LI&gt;check for "spoof" entries in log&lt;/LI&gt;
&lt;LI&gt;check for "&lt;EM&gt;DOS/Rate Limiting Policy&lt;/EM&gt;" entries in log&lt;/LI&gt;
&lt;LI&gt;enable session logging and check for "&lt;EM&gt;source country&lt;/EM&gt;" or "&lt;EM&gt;destination country&lt;/EM&gt;"&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="25px" bgcolor="lightgreen"&gt;Layer 5&lt;/TD&gt;
&lt;TD width="25%" height="25px"&gt;Admin security&lt;/TD&gt;
&lt;TD width="25%" height="25px"&gt;
&lt;UL&gt;
&lt;LI&gt;organizes regular firewall security reviews&lt;/LI&gt;
&lt;LI&gt;regularly reports to management&lt;/LI&gt;
&lt;LI&gt;maintains an up-to-date firewall documentation&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="25px"&gt;
&lt;UL&gt;
&lt;LI&gt;relics of configuration&lt;/LI&gt;
&lt;LI&gt;inconsistencies&lt;/LI&gt;
&lt;LI&gt;instabilities&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%" height="25px" bgcolor="lightgreen"&gt;Layer 6&lt;/TD&gt;
&lt;TD width="25%" height="25px"&gt;End user security&lt;/TD&gt;
&lt;TD width="25%" height="25px"&gt;
&lt;UL&gt;
&lt;LI&gt;regularly receives IT-security awareness trainings&lt;/LI&gt;
&lt;LI&gt;is protected by a proper Endpoint security corp policy&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" height="25px"&gt;social engineering&lt;/TD&gt;
&lt;TD width="12.5%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Mon, 12 Jul 2021 11:38:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Layers-of-Defense/m-p/123593#M22873</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2021-07-12T11:38:34Z</dc:date>
    </item>
  </channel>
</rss>

