ISO 27001 Requirements

ISO 27001 Regulatory Mandate deals with the Information Security controls that ensures your network security by monitoring Firewall Configuration Policies, Network Traffic through your perimeter devices and more. Firewall Analyzer helps meeting the requirements of this mandate with its out-of-the-box reports.

ISO 27001 requirements met by Firewall Analyzer

RulesDescriptionHow Firewall Analyzer meets requirements
9.2Refer the user accounts and remove unnecessary accounts(if any)Firewall Analyzer lists down the users of your firewall with which you can analyze the user accounts and decide on which user account is to be retained and which is to be removed
9.4Configuring telnet is not advisable, use ssh instead. This will improve securityFirewall Analyzer provides you the detail of all the Services viz., HTTP, Telnet, SSH and User Access details which helps you to manage your Firewall Access control efficiently by avoiding insecure services for Management Access
12.4.1Enabling the log information will help you to look for details for every transaction. Keep the logs for 6 monthsFirewall Analyzer enables firewall devices logging and it archives firewall logs that helps you to keep track of every transaction made
12.4.2Protect your logs by encrypting those while storing it. This prevents unauthorized accessFirewall Analyzer has the capability to enrypt raw logs that prevents unauthorized access
12.4.3Know what commands are executed in your firewall, Need to enable admin logsFirewall Analyzer provides you out-of-the-box report on all the commands that are executed in your firewall device
12.4.4Configuring NTP server helps all machines time synchronizedFirewall Analyzer helps you to know the NTP server configuration details that provides better insights on time synchronization of all machines
13.1.1Verify that inbound and outbound traffic is limited to that which is necessary for the cardholder data environment, and that the restrictions are documentedFirewall Analyzer provides you out-of-the-box detailed reports on all the rules that deals with
  • Allowed Traffic from and to your DMZ
  • Non-Documented Denied traffic from and to your DMZ
These reports helps you to analyze your inbound and outbound traffic on your business sensitive data environment and allows you to block the unwanted traffic
13.1.3Limit inbound Internet traffic to IP addresses within the DMZFirewall Analyzer provides you a detailed report on rules that allows traffic from Untrust zone to your DMZs/Non- DMZs. This helps you to analyze your internal internet traffic and allows you to limit the internet traffic to IP addresses within your perimeter network
13.1.4Do not allow any direct connections inbound or outbound for traffic between the Internet and the data environmentFirewall Analyzer's detailed reports on all the rules that is configured to allow traffic from secured data zone to untrust sources, helps you to analyze the inbound/outbound traffic between the internet and the data environment.It also allows you to block the direct network connections if any
13.1.5Do not allow internal addresses to pass from the Internet into the DMZ.Firewall Analyzer provides you the rules report on
  • Allowed Traffic from External IPs to DMZs via WAN interface
  • Allowed Traffic from Internal IPs to DMZs via WAN Interface
These report helps you to block internal addresses to pass from internet to the perimeter network.

 

Refer Firewall compliance management software page for more details about other firewall security standards compliance.

 

Featured links

Other features

Firewall Rule Management

Manage your firewall rules for optimum performance. Anomaly free, properly ordered rules make your firewall secured. Audit the firewall security and manage the rule/config changes to strengthen the security.  

Firewall Reports

Get a slew of security and traffic reports to asses the network security posture. Analyze the reports and take measures to prevent future security incidents. Monitor the Internet usage of enterprise users.

Firewall Log Management

Unlock the wealth of network security information hidden in the firewall logs. Analyze the logs to find the security threats faced by the network. Also, get the Internet traffic pattern for capacity planning. 

Real-time Bandwidth Monitoring

With live bandwidth monitoring, you can identify the abnormal sudden shhot up of bandwidth use. Take remedial measures to contain the sudden surge in bandwidth consumption.

Firewall Alerts

Take instant remedial actions, when you get notified in real-time for network security incidents. Check and restrict Internet usage if banwidth exceeds specified threshold.

Manage Firewall Service

MSSPs can host multiple tenants, with exclusive segmented and secured access to their respective data. Scalable to address their needs. Manages firewalls deployed around the globe.

 

Thank you for your feedback!

Was this content helpful?

We are sorry. Help us improve this page.

How can we improve this page?
Do you need assistance with this topic?
By clicking "Submit", you agree to processing of personal data according to the Privacy Policy.
A single platter for comprehensive Network Security Device Management