9.5: Implement Application Firewalls

Place application firewalls in front of any critical servers to verify and validate the traffic going to the server. Any unauthorized traffic should be blocked and logged.

Asset Type

Security Function

Implementation Groups

Devices

Protect

3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

  • Sub-control 2.1: Maintain Inventory of Authorized Software

  • Sub-control 2.5: Integrate Software and Hardware Asset Inventories

Inputs

  1. The list of endpoints

  2. The list of authorized software

Operations

  1. Enumerate endpoints identified as critical in the endpoint inventory

  2. Enumerate all application firewalls from the software inventory

  3. For each identified application firewall, enumerate the endpoints it covers
    1. Enumerate the set of identified endpoints - covered endpoints

  4. Complement the set of covered endpoints with the set of critical endpoints

Measures

  • M1 = List of critical endpoints

  • M2 = List of application firewalls

  • M3 = List of endpoints covered by at least one application firewall

  • M4 = List of endpoints not covered by at least one application firewall

  • M5 = Count of critical endpoints (count of M1)

  • M6 = Count of application firewalls (count of M2)

  • M7 = Count of endpoints covered by at least one application firewall (count of M3)

  • M8 = Count of endpoints not covered by at least one application firewall (count of M4)

Metrics

Coverage

Metric

The ratio of endpoints covered by at least one application firewall to the total number
of critical endpoints

Calculation

M7 / M5