9.5: Implement Application Firewalls
Place application firewalls in front of any critical servers to verify and validate the traffic going to the server. Any unauthorized traffic should be blocked and logged.
Asset Type |
Security Function |
Implementation Groups |
---|---|---|
Devices |
Protect |
3 |
Dependencies
Sub-control 1.4: Maintain Detailed Asset Inventory
Sub-control 1.5: Maintain Asset Inventory Information
Sub-control 2.1: Maintain Inventory of Authorized Software
Sub-control 2.5: Integrate Software and Hardware Asset Inventories
Inputs
The list of endpoints
The list of authorized software
Operations
Enumerate endpoints identified as critical in the endpoint inventory
Enumerate all application firewalls from the software inventory
- For each identified application firewall, enumerate the endpoints it covers
Enumerate the set of identified endpoints - covered endpoints
Complement the set of covered endpoints with the set of critical endpoints
Measures
M1 = List of critical endpoints
M2 = List of application firewalls
M3 = List of endpoints covered by at least one application firewall
M4 = List of endpoints not covered by at least one application firewall
M5 = Count of critical endpoints (count of M1)
M6 = Count of application firewalls (count of M2)
M7 = Count of endpoints covered by at least one application firewall (count of M3)
M8 = Count of endpoints not covered by at least one application firewall (count of M4)
Metrics
Coverage
Metric |
The ratio of endpoints covered by at least one application firewall to the total number
of critical endpoints
|
Calculation |
|