Why Boundary Firewall and Internet Gateway is important?
This control applies to every business where employees have access to the Internet. Boundary Firewall and Internet Gateway will identify and prevent unauthorised access to organisation’s network, computers and systems. It can help protect against common cyber threats by implementing restrictions to inbound and outbound network traffic, known as “Firewall rules”
How to manage Boundary Firewall and Internet Gateway requirement?
Change default administrative password for any firewall to alternative, strong password
Rules that allow network traffic to pass through the firewall should be subjected to approval by an authorised individual and documented
Disable or block unapproved/unauthenticated connections or connections that are known vulnerable to attacks by default
Remove or disable Firewall rules that are no longer required
Use a host-based firewall on devices which are used on untrusted networks, such as public Wi-Fi hotspots. Host-based firewall works in the same way as a boundary firewall but only protects the single device on which it is configured
Prevent access to the admin interface (used to manage firewall configuration) from the Internet, unless there is a clear and documented business need. The interface should be protected by extra security measures using Second Authentication Factor, encrypted connection/SSL and restricted access by a limited number of IP whitelist.
About the Cyber Essentials Scheme
This is the first of a series of blog posts dedicated to the five key controls of the Cyber Essentials Scheme.
Cyber Essentials is a government-backed, industry supported scheme to help organisations implement measures to help protect themselves against common cyber-attacks. The scheme focuses on the five most important technical security controls that, when implemented correctly, can reduce significantly an organisation’s vulnerability.
Download our non-technical, no-jargon “Quick Guide to Cyber Essentials – Cyber Security starting point for small and medium businesses” to learn more about Cyber Essentials Scheme, its five key controls and how to implement them correctly.
How Urban Network can help
It is now becoming more important than ever to ensure your business is protected and certified against the cyber risks. As a Gold IASME certified body, Urban Network is fully qualified to help your business achieve security compliance with the Cyber Essentials Scheme. Get in touch with our cybersecurity experts today to learn how you can improve your business security, assess current IT infrastructure and prepare a successful accreditation process.