Firewall Check List
Firewall Check List
| 1
Firewall AUDIT CHECKLIST
A firewall audit has little chance of success without visibility into the network, including software, hardware,
policies, and risks. Below are examples of the basic information needed to plan firewall audit work:
Firewalls exist between a router and application servers to provide access control. Firewalls were initially used to
protect a trusted network from an untrusted network. Still, these days it is increasingly common to protect
application servers on their networks from untrusted networks.
In this context, you need to establish a robust firewall access control and audit it regularly.
Is there a formal process or controls to authorize employees and non-employees to use the Internet, and what access levels are
granted?
Evaluate the timeliness and completeness of the methods used.
Is there a password policy and are password control features implemented for all accounts?
Have default accounts been disabled or default passwords changed from vendor-supplied values?
Get a list of users with firewall access and compare it to documented approved requests.
Can each user be uniquely identified?
Evaluate whether the authentication methodologies used are effective.
Are outsourcing accesses made?
Do users who have access to the Internet periodically review it? When was the last review done?
Are there periodic reviews of inactive accounts? What are the measures taken to resolve conflicts?
An effective change management process is required to ensure that firewall changes are executed and traced
correctly and provide ongoing compliance. Information such as why each change is needed and who authorized
the change should be specified in firewall changes.
Also, poor documentation of changes and insufficient verification of the impact of each change on the network
are two of the most common problems when it comes to change control.
Review change management procedures on a per-rule basis. A few essential questions to explore include:
o Do the requested changes undergo appropriate approvals?
o Does authorized personnel implement changes?
o Are changes being tested?
o Are changes documented against regulatory or internal policy requirements? Each firewall rule should have a
comment with the name of the person who applied the change.
o Is there an expiration date for the firewall changes?
Firewall AUDIT CHECKLIST
Check to see if there is a formal and controlled process in place for reviewing, approving, and implementing firewall changes.
This procedure should include at the very least the following steps:
o The business purpose for a change request
o Duration (timeframe) for the new/modified rule
o Evaluation of potential risks associated with the new/amended rule
o Formal approvals for new/amended rule
o Assign to the appropriate administrator for the application
o Verify that the change has been tested and implemented correctly
Determine if all changes are allowed and flag unauthorized rule changes for further investigation.
Determine whether real-time monitoring of changes to the firewall is enabled and authorized requesters, administrators, and
stakeholders are granted access to rule change notifications.
Monitoring the activity of your firewalls means keeping track of data such as current rule configurations, alerts,
and event logs. In particular, keeping track of existing rule configurations is essential for monitoring accesses and
identifying legacy firewall rules that need to be removed or replaced.
Without monitoring your firewall, it is difficult to make informed decisions about firewall management and rule
configurations.
In addition, security controls are required to ensure that firewall rules are compliant with the organization and
external security regulations that apply to the network. Unauthorized firewall configuration changes with policy
violations can cause incompatibility. It is essential to perform regular security checks to ensure that unauthorized
changes are not made.
Monitoring the firewall will also keep you updated on necessary changes made to the firewall and alert you to the
potential risks posed by these changes. Security audits and monitoring are essential when a new firewall is
installed, firewall traversal activity occurs, or bulk configuration changes are made to firewalls.
De-cluttering firewall rules and optimizing the rule base can significantly improve IT productivity and firewall
performance. In addition, optimizing firewall rules can dramatically reduce many unnecessary burdens in the
auditing process.
Firewall AUDIT CHECKLIST
Delete any useless firewall rules.
Delete or disable expired and unused firewall rules and objects.
Identify firewall rules that are disabled, inactive, or unused and should be removed.
Assess the effectiveness and performance
of the firewall rule order.
Unused links, including unused source, destination, and service paths, should be removed.
Identify and combine similar rules that can be incorporated into a single rule.
Identify excessive permissive rules by analyzing actual policy usage against firewall logs. Adjust these rules according to
policy and real usage scenarios.
Analyze VPN parameters to identify unused users, unadded users, expired users, near-expiring users, unused groups, unadded
groups, and expired groups.
Enforce object naming conventions.
Create document rules, objects, and policy revisions for future reference.
It is essential to ensure that each firewall is physically and software security to protect against the most basic
types of cyberattacks.
Ascertain that the firewall and management servers are physically secure and have restricted access.
Check that you have an up-to-date list of authorized personnel who have access to firewall server rooms.
Check that all necessary vendor patches and updates have been installed.
Make sure the operating system passes standard hardening checklists.
Review the procedures used for device management.
Often, when you least expect it, firewalls can crash, human errors can occur, and disasters can strike. Your data is
precious and having a backup and recovery plan in place is a crucial part of running your business. The best way
to back up data and understand what is valuable is to think about what would happen if you permanently lost
some or all of your data? and how it would affect your organization.
A comprehensive risk assessment required for any firewall audit will identify risky rules and ensure that the rules
comply with internal policies and relevant standards and regulations.
Identify all potentially “risky” rules based on industry standards and best practices and prioritize them by severity.
Risky rules may differ for each organization, depending on the network and the acceptable level of risk. Still,
there are many frameworks and standards you can leverage that provide a good point of reference.
A few things to look for and verify in a firewall risk assessment include:
Are there any firewall rules that violate your corporate security policy?
Is there a firewall rule with “ANY” on the source, destination, service, protocol, application, or user fields and action allowed?
Are there rules allowing risky services from your DMZ to your internal network?
Firewall AUDIT CHECKLIST
Are there any rules that allow risky Internet services?
Is there a set of rules that allows risky services to be offered on the Internet?
Is there a set of rules in place that allow direct traffic from the Internet to the internal network?
Are there rules in place that allow Internet traffic to sensitive servers, networks, devices, or databases?
Examine firewall rules and configurations about relevant regulatory or industry standards such as PCI DSS, SOX, ISO 27001,
NERC CIP, and FISMA, as well as corporate policies that define critical hardware and software configurations.
Document and assign an action plan to correct the risks and compliance exceptions found in the risk analysis.
Verify that remediation work and rule changes are completed correctly.
Track and document the completion of improvement work.
A successful firewall audit requires validation of secure configuration and regular audits to ensure continued
compliance. Now that you’ve successfully audited and secured your firewall’s configuration, you must take the
necessary steps to ensure ongoing compliance. Ascertain that a process for continuous auditing of firewalls is in
place.
Below are detailed checklist steps to review the firewall rule base:
# 1: It is essential to know the Architecture of the Network, Scheme IP address, and VLAN information.
# 2: Check out the rule about cleaning. Cleanup rules are defined under the rule base where you must deny
“Any” Source to “Any” Port to “Any” Port. The purpose of having a cleanup rule is to log and deny traffic
that doesn’t follow any rule bases.
# 3: Make sure it’s a secret rule. The privacy rule is the rules that tell you to deny “any” resource for the
firewall. There must be a confidentiality rule as per the Rules of Management.
Note that the cleanup rule at the end of the rule base will block malicious traffic targeted for the firewall
even if there is no privacy rule. The stealth rule is specially created to block traffic instantly as it detects
the target because it is undesirable to search thousands of rule bases for the best match and increase
unnecessary firewall processing power.
# 4: Ensure the rules for firewall management are at the top of the list of rules. Ensure a limited
administrator in the Source Address field and large subnets are not allowed to access the firewall, and
limited ports are defined for access to management.
# 5: Make sure duplicate objects, services, or host networks are removed from the rule base.
# 6: Make sure that the rules must be named, making the rule base easier to understand. For example, use
a consistent host format such as Host Name IP.
# 7: Make sure the excess/shadow rules are removed from the rule base.
# 8: Make sure unused links are excluded from the base rule, including unique source, destination, and
services. You can check the hit count column to see what the last hit count is for the rules.
# 9: Remove rules that haven’t been used for a long time. Remove the rule with zero-hit total count links.
# 10: Make sure the highest number of hits is above the base for the rule. Make sure that the best services
and goals are adequately positioned within the rule base.
Firewall AUDIT CHECKLIST
# 11: Make sure that expiring rules and objects are removed from the rule base. The administrator usually
provides temporary access to the rules but forgets to delete them if the rule expires.
# 12: Ensure that no service/port is allowed in the basic rule, regardless of inbound or outbound
connections, as long as there is a legitimate business justification and accepts the risk.
# 13: Ensure that no source or destination is allowed in the rule base, regardless of inbound or outbound
connection, provided a valid business justification and acceptance of risk.
# 14: Beware of no direct inbound connections to the internal network.
# 15: Make sure that two-way access is used legitimately. An administrator can configure bidirectional
access even though sometimes bidirectional access is not required.
# 16: Evaluate firewall rule order to get adequate performance.
# 17: Be sure to include the rule base header for quick recognition of rules. For example, add headings
like management rules, HR rules, cleanup rules, Vendor rules.
# 18: Make sure vulnerable ports/services are not allowed based on rules.
# 19: Make sure the rule base should contain standard comments for each rule.
# 20: Identify similar rules that can be combined into a single rule.
# 21: Make sure you add the IP address to the group and have the proper naming convention. Groups can
hide errors while applying or changing policies.
# 22: Make sure logs are enabled for each rule in the rule base.
# 23: Ensure that appropriate business rationale exists for the wide variety of subnets given access in the
rule base.
# 24: Make sure the rules are given according to the policy matrix the organization has created. The policy
matrix is the table that gives information to allow or block traffic from which zone or VLAN.
| 2