Do you route your internal traffic through your firewall rules and policies?
If not, you are assuming a LOT of things about a LOT of things :)
Do you route your internal traffic through your firewall rules and policies? If not, you are assuming a LOT of things about a LOT of things :) 10 comments
Another one. Do you let your endpoints see each other on the network? Do you have any reason to? Are your servers grouped? Can they see each other? Do they have any reason to? Sure, some might… but all? Do they communicate with each other through the firewall? @SecurityWriter the public IP thing bothers me less, but that’s because I’ve worked in with public-only network configurations and also done some IPv6 rollouts. I think NAT-as-security is a crutch. As for calling NIC-level network controls firewalls, I’m firmly in the form-radical-function-neutral quadrant of the firewall alignment chart. @SecurityWriter I googled after I typed that, and seems it hasn’t been created already? I’ll see if I can find some free time some year soon and create one. |
Further to this, do you have all of the IPs, Ports, and FQDNs for applications within your environment set as firewall rules?
:)