For better security: always "block all" or "block in all" is enough?

Greg Hennessy Greg.Hennessy at nviz.net
Thu Jul 29 19:08:30 UTC 2010



> If, as you say, there are "Governance, Risk, and Compliance reasons", 
> perhaps you'd like to specify one or two for each category?

Start with an ISMS derived from 27k, add a soupcon of PCI DSS requirement 10, Basel II, throw in SOX 404 or an SAS 70 type II audit, you get the picture. 

> Logging a default deny on an internal firewall, yes - ok - I agree with you, that's probably reasonable.

Only probably? How much 'commercial' firewall work have you done again, seriously ?
 
>  However, logging every blocked packet on an internet facing firewall is plain daft. 

Saying it doesn’t make it so. 

> Even the storage requirements would be somewhat onerous, 

Storage is cheap. Damage to reputation caused by being in breach of regulatory requirements w.r.t log retention is not. 

> and that's before trying to process the data into something meaningful.  
> And all to confirm that there's a lot of noise and port scanning going on.

Or it's part of a much larger picture which is fed into an SIEM system for event correlation and consequent alerting. 

Firewalls are not the only security control points


Greg



More information about the freebsd-pf mailing list