This policy operates perimeter firewalls between the internet and its private internal network in order to create a secure operating environment for an organization’s computer and network resources. This policy helps distribute the flow of traffic and is easily overlooked. Firewalls establish a control point within the information system of the company.
Sound security policies must always be considered your first line of defense. The starting point of truly secure firewalls is to fully document in a comprehensive firewall policy what each of your firewalls should and should not do. This may sound simplistic, but some of the key tasks a firewall should perform are easily overlooked. Download this firewall policy template to help you develop, implement, and enforce a set of sound firewall rules.
Risks Addressed by Policy:
- Susceptible to external virus attacks.
- Low Security levels.