Does anybody have any good (hopefully free) resources for learning more about how to design an effective set of access rules on a FW? I understand that every network's needs will be different but I'm looking more for some good references on guiding principles or best practices that generally work across the board.
I've looked at DoD STIGS and they were helpful but I'm trying to go beyond just the standard list of known vulnerable ports/protocols.
Edit: referring to an actual FW appliance in case I wasn't clear
No comments:
Post a Comment