The key to ensuring that your firewall not only is an effective security measure but is secure in and of itself relies on a well-planned methodology of first defining the security requirements and objectives with a series of written security policies. Then, use those security policies as a guide to build effective and functional ingress and egress filters (and implement secure methods of management access). |