System is Armed! ft. Bryon Singh, RailWorks Corporation

System is Armed! ft. Bryon Singh, RailWorks Corporation

By Steve Gold
Posted in Security
On August 01, 2023

Many homeowners invest in home security systems to protect their property and loved ones. These systems often include components such as alarms, surveillance cameras, and access control measures. They act as a deterrent against intruders and provide peace of mind by ensuring the safety and security of the household.

Similarly, implementing and managing a firewall on end-user devices can be compared to having a personal security system for digital devices. A firewall acts as a digital barrier, monitoring and controlling incoming and outgoing network traffic on the device. It helps protect against unauthorized access, malicious attacks, and the spread of malware by filtering and blocking potentially harmful traffic.

Just as a home security system is designed to safeguard the physical space and its inhabitants, a firewall protects the digital space and its users. It acts as a line of defense, preventing unauthorized access to personal information, financial data, and other sensitive data stored on end-user devices. By monitoring network traffic, a firewall can identify and block suspicious or malicious activity, providing an additional layer of security against cyber threats.

Like the implementation and meticulous management of firewall measures in the previous post: Um, Yeah, No!, it is essential to implement firewalls on both end-user devices and enterprise servers. For end-user devices, add a host-based firewall or port-filtering tool to all devices in your inventory. Set a default-deny rule that blocks all traffic except for a predefined list of services and ports with explicit permissions. Firewalls can thwart the spread of malware and ransomware within the local network and prevent unauthorized access to sensitive files and limit unauthorized network communication and data exfiltration attempts by employees with malicious intentions.

Regularly test and update your firewalls to ensure they are properly configured and effective. Conduct firewall tests at least once a year and whenever there are significant changes to your environment or security requirements. Many regulatory standards and frameworks, such as the Payment Card Industry Data Security Standard (PCI DSS) and the General Data Protection Regulation (GDPR), require organizations to implement firewalls and secure their end-user devices to protect sensitive data.

Remember, while firewalls play a crucial role in security, they are not sufficient to address threats from malware or social engineering attacks. Therefore, it is essential to adopt additional protection strategies to safeguard end-user devices from potential malicious intrusions.

Here’s a link to a Secure Configuration Management Policy Template provided free of charge from the fine folks at the Center for Internet Security: https://www.cisecurity.org/insights/white-papers/secure-configuration-management-for-cis-control-4

Here’s some details on this specific Control/Safeguard. If you want more detail, DM me.

CIS Control 4 – Secure Configuration of Enterprise Assets & Software

Establish and maintain the secure configuration of enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/IoT devices; and servers) and software (operating systems and applications).

Implementation Group 1

CIS Safeguard 4.5 - Implement and Manage a Firewall on End-User Devices

Implement and manage a host-based firewall or port-filtering tool on end-user devices, with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.