Skip to main content

Minimizing the exposure of systems to external networks

  • nstall and configure gateway firewall, IPsec and SSL VPN, and wireless;
  • Configure inbound and outbound Access Control List (ACL) to control only required and legitimate traffic only to be allowed to go in and out of the network;
  • Close all the ports and only open the required port;
  • Avoid “any” “any” rules set up in all the configurations;
  • All rules must be configured to ensure no “ unwanted services” or “hosts” are exposed to the internet, web protection anti-malware, web and app visibility, control, and protection;
  • Implement network segregation by having Demilitarized Zone (DMZ) for public facing servers, server zone and user zone;
  • Ensure that the network is secure by segregating different administrative duties;
    consider network protection including IPS, REB, HYML5 VPN, ATP, and Security
    Heartbeat.
  • All remote access to ICT infrastructure should be done via VPN.