- CheckMates
- :
- Products
- :
- General Topics
- :
- Layers of Defense
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Layers of Defense
** Work in progress **
Configuring a firewall to defend attacks and protect your network/assets means taking several layers of defense into account. It's not just the rulebase that makes up a firewall security. In fact there are many more layers of protection and defense that together build up a strong level of firewall security.
These layers are often easy to deploy and set active, one just needs to know that they are available and ready to form your shield of protection.
So let's start to list them all up.
Layers of defense | Field of security | Description | Protection | Method of validation |
Layer 1 | Physical security | secure space within a 19" rack in a secured spot only accessible to firewall admins | ||
Layer 2 | Network security |
|
||
Layer 3 | Gaia OS security |
|
Ransomware |
|
Layer 4 | Firewall security |
|
|
|
Layer 5 | Admin security |
|
|
|
Layer 6 | End user security |
|
social engineering |
0 Replies
