hey everyone welcome back to cyber gray matter in today's video we're going to be going over the basics of how to audit a firewall this video will have six steps of the firewall auditing process and i think you'll find a lot of these concepts helpful and correlate to all general technology fields including the emphasis on procedures and documentation this video won't be a deep dive into the technical details but it goes over compliance best practices and other security concepts it's a good start to get an idea of what the auditing process is like let's jump right into it so let's start with what a firewall even is a firewall is a networking device and tool that manages connections between different internal or external networks they can accept or reject connections or even filter them and everything is based on rules remember that firewalls work on the network and transport layer so three and four of the osi model however there are some firewalls that can operate on the application layer or layer 7 of the osi model and these are considered smarter they're known as next generation firewalls also please don't confuse the application layer tidbit about the next-gen firewall with a web application firewall it's not the same thing so what's a firewall audit a firewall audit is a process of investigating the existing aspects of a firewall and this can include access and connections along with the identification of vulnerabilities and reports on any changes so why are audits important with all the compliance standards out and being used firewall audits are a way to prove to regulators or business partners that an organization's network is secure some of these standards include things such as the payment card industry data security standards or pci dss the general data protection regulation gdpr sarbanes-oxley or sox the health insurance portability and accountability act hipaa or the california consumer privacy act or ccpa other than firewall audits being required they're simply best practice if you audit a firewall you're likely to catch a weakness or openness within your network and security posture this way you can adapt your policies to fit this doing due diligence is important in cyber security in reviewing controls and policies will be one piece that helps protect an organization if there might be the unfortunate circumstance of a lawsuit breach or some sort of regulatory issue that may come up auditing a firewall will ensure that your configuration and rules adhere to internal cyber security policies besides safety a firewall audit can help improve performance by fixing the optimization of the firewall rule base and we'll go into that a little bit later now let's get into the six steps of the firewall audit step one collect key information this is prior to the audit there needs to be information gathered during this time there needs to be visibility into the network with software hardware policies and risks in order to plan the audit you will need the following key information copies of the relevant security policies the firewall logs that can be compared to the firewall rule base to find which rules are being used an accurate and updated copy of the network in the firewall topology diagrams any previous audit documentation including the rules objects and policy revisions vendor firewall information including the os version latest patches in the default configuration and finally understanding all the critical servers and repositories within the network step 2 assess the change management process the change management process starts with the request to change some sort of process or technology it's from the beginning with a conception through the implementation and then to the final resolution change management within a firewall audit is important because there needs to be traceability of any firewall changes and also ensure compliance for the future the most common problems with the change control involved issues with the documentation such as not including or being clear why the change was needed who authorized the changes in poor validation of the network impact of each change some requirements for the rule-based change management are the following make sure the changes are going through the proper approval and are implemented by the authorized personnel changes should be tested and documented by regulatory and internal policy requirements each rule should be noted to include the change id of the request and have a sign off with the initials of the person who implemented the change make sure there is an expiration date for the change if one should exist determine whether there is a formal and controlled process in place for the request review approval and implementation of the firewall changes and this process should include business purpose for the change request duration from the new modification rule assessment of the potential risk associated with the new or modified rule formal approvals from new and modified rules assignment to the proper administration for implementation verification that the change has been tested and implemented correctly authorization must be granted to make these changes and any unauthorized changes should be flagged for future investigation it should be determined whether the real-time monitoring of changes to the firewall are enabled authorized requesters admins and stakeholders should be given rule change notifications step 3 audit the os and physical security firewall audits don't just involve the rule-based policies but the actual firewall itself it's important to ensure that the firewall has both physical and software security feature verification this involves the hardware and os software of the firewall it's important that there's a physical security protecting the firewall and management servers with controlled access this ensures that only authorized personnel are permitted to access the firewall server rooms vendor operating system patches and updates are extremely important and it should be verified that these are here the operating system should also be audited to ensure that it passes common hardening checklists the device administration procedure should also be reviewed step 4 declutter and improve the rule base in order to ensure that the firewall performs at peak performance the rule base should be decluttered and optimized this also makes the auditing process easier and will remove the unnecessary overhead to do this start by deleting the rules that aren't useful and disable expired and unused rules and objects delete the unused connections and this includes source destination and service routes that aren't in use find the similar rules and consolidate them into one rule identify and fix any issues that are over permissive and analyze the actual policy against firewall logs analyze vpn parameters in order to uncover users and groups that are unused unattached expired or those that are about to expire enforce object naming conventions finally keep a record of rules objects and policy revisions for future reference step 5 perform a risk assessment and fix issues a thorough and comprehensive risk assessment will help identify any risky rules that ensure the rules are compliant with internal policies and relevant standards and regulations this is done by prioritizing the rules by severity and based on industry standards and best practices this is based upon company needs and risk acceptance of an organization things to look for check to see if there are any rules or go against and violate your corporate security policy do any of the firewall rules use any in the source destination service protocol application or use fields with a permissive action do any of the rules allow risky services for your dmz to the internal network what about any rules that allow risky services from the internet coming inbound to sensitive servers networks devices and databases it's also good to analyze firewall rules and configurations and check to see if there are any complying with regulatory standards such as pci dss socks iso and other policies that are relevant to the organization these might be policies for hardware software configurations and other devices there should be an action plan for remediation of these risks and compliance exceptions that are identified in the risk analysis it should be verified that the remediation efforts have taken place and any rule changes have been completed correctly and as always these changes should be tracked and documented step six conduct ongoing audits now that the initial audit is done we need to continue auditing to ensure that this is ongoing ensure that there is a process that is established and continuous for future firewall audits in order to avoid air and manual tasks these can be automated with analysis and reporting all procedures need to be documented and this is in order to create a complete audit trail for all firewall management activities ensure that there is a robust firewall change workflow in place to maintain compliance over time and finally ensure that there is an alerting system in place for significant events and activities this includes changes to certain rules or if a new high severity risk is identified in the policy thanks for watching i hope you've had fun learning about firewall auditing please leave a like and any questions down in the comment section below thanks you