Skip to main content

Consideration to utilize NGFW (Next-Gen Firewall) features (Part 1)

Background

Having an Firewall to securing perimeter gateway in enterprise network is a mandatory requirement nowday. Without it, enterprise will have vulnerabilities that might be exposed to external and would be increasing possibility security incidents occur that impact to enterprise business activity.
Enterprise should be aware of this security risks. When everything transforming become digital, existence of information classification start from lowest (public) to highest (confidential) should be define by enterprise. Every single information that invaluable could be very valuable especially by unauthorized persons. Accessing to information classification should be limited only to authorized person only. This is one of the firewall role.


When security threat evolving continually also followed by security devices. Formerly firewall capability only to limited access such as permit and allowed access, nowday to strengthen the firewall functional improved to the next level. Many capabilities added such as packet inspection, Intrusion Prevention System (IPS), Data Loss Prevention (DLP), URL Filtering, Antivirus, Identity Management, etc. All this capabilities, called features, have advantages and also disadvantages.

Define Requirements Clearly

Keep in mind, you should define your security requirements first before you start to perform product evaluations. Every product have disadvantages and advantages. They might be offering identical solutions. But to achieve it, they might be using different security mechanism. Do they solutions fit with the enterprise objectives? This question can be answer only through the requirements.
Clearly requirement will more helping the enterprise to achieve their objectives. Start evaluate existing environment. Evaluate every entry point that might be caused information exposed to unauthorized persons. Both entry point could be from logical or physical access. Brainstorming the requirements internally and finalized it by create an documentation. Both requirements could divide into technical and data sheet. Simple spreadsheet could help you.
Some of requirements that might be took as parameters such as:

  1. High availability, which use to keep services up and running securely.
  2. Load balancing, which use to balancing traffic between Firewall and utilize performance optimally.
  3. Stateful inspection, which use to track packet state connections.
  4. Dynamic and static routing such as BGP, OSPF, static route, etc.
  5. Identity management, which could integrate with identity management tools such as Active Directory.
  6. Supporting external log and event management such as Splunk and ArcSight.
  7. Throughput capabilities, simply which used as maximum packet could passed the Firewall.
  8. How many physical port available which can used by Firewall.
  9. Power consumptions.
  10. Physical dimensions.
  11. Vendors technical support, capabilities and knowledge to support the enterprise objective.
  12. 3rd party reviews such as Gartner and NSS Labs.
  13. Additional requirements to be comply to external regulator, such PCI.
  14. The enterprise budget.

Features, features, and features...

As mention in the previous paragraph, nowday security vendors added security features in their product to be consider as added value than others. But the questions is do you really need all features to be used to secure your environment? Next one is do all security features should be enable in 1 Firewall box / use different security box? It took a deep analysis by evaluate certain parameters to answer that questions.
Basically what you need to remember that more security feature to be enable it will decreasingly the Firewall performance and it will sacrifice Firewall capabilities to process the packets. It will need bigger Firewall series.

This section will be discussed in next topic.
Thank you for reading.

- EJ

Popular posts from this blog

Konfigurasi Wazuh sebagai perangkat monitoring keamanan TI

Didalam dunia keamanan teknologi informasi, menggunakan  tools  yg powerful dan gratis merupakan satu hal yg sangat penting dalam membantu meningkatkan visibilitas keamanan. Salah satu tools  tersebut adalah Wazuh . Bagi pakar keamanan yg sudah cukup lama berkecimpung didalam dunia keamanan teknologi informasi, tools Wazuh tidaklah asing. Malah mungkin sudah menjadi salah satu tools  wajib yg harus dimiliki dalam aktifitas pengamanan aset teknologi informasi.

Securing Your Password To Protect Your Data

Background Someday when I joint in an open discussion with a group of friends, I asked them the question about how often they are change their bank account PIN. I asked them in certain period start from 1 months, a quarter then in 1 year, less than 3 person raise their hands. Then I asked them again about did they already change their bank account PIN since they open their account for the first time. Parallel with previous question, less than 3 person raise their hands. Surprisingly that's the fact!