9.4: Apply Host-Based Firewalls or Port-Filtering
Apply host-based firewalls or port-filtering tools on end systems, with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed.
Asset Type |
Security Function |
Implementation Groups |
---|---|---|
Devices |
Protect |
1, 2, 3 |
Dependencies
Sub-control 1.4: Maintain Detailed Asset Inventory
Sub-control 1.5: Maintain Asset Inventory Information
Inputs
Endpoint Inventory: Derive from the endpoint inventory those endpoints able to scan (assumed capable of hosting firewall/port-filtering software)
A policy (or set of policies, potentially individually per endpoint) indicating the ports that are allowed to be open
Operations
For each endpoint, retrieve the firewall policy
For each firewall policy, enumerate both the ports which allow communication, and any configuration of a default deny rule (could that be a default?), noting along the way appropriately configured policies and inappropriately configured policies
Measures
M1 = List of endpoints
M2 = Count of M1
M3 = List of endpoints with appropriately configured firewall ports policy
M4 = Count of M3
M5 = List of endpoints with inappropriately configured firewall ports policy
M6 = Count of M5
M7 = List of endpoints with appropriately configured default deny rule
M8 = Count of M7
M9 = List of endpoints with inappropriately configured default deny rule
M10 = Count of M9
M11 = List of endpoints with both appropriately configured firewall policy
M12 = Count of M11
M13 = List of endpoints with at least one inappropriate firewall configuration
M14 = Count of M13
Metrics
Coverage
Metric |
The ratio of correctly configured endpoints to the total number of endpoint?
|
Calculation |
|