Um, Yeah, No! ft. Bryon Singh, RailWorks Corporation

Um, Yeah, No! ft. Bryon Singh, RailWorks Corporation

By Steve Gold
Posted in Security
On July 25, 2023

Steve’s Thoughts

I’ve heard this many times in my life from a bouncer at a club/event. Sometimes it was my ID, sometimes there were too many people already in, and sometimes it was because, well, they just said no.

Nightclubs and events employ bouncers to control access and maintain security within the venue. Bouncers act as a barrier between the outside world and the controlled environment inside, ensuring that only authorized individuals are granted entry.

Similarly, a firewall can be compared to a bouncer for servers. A firewall acts as a protective barrier between a server and the external network, monitoring and controlling incoming and outgoing network traffic based on predefined security rules. It helps prevent unauthorized access, malicious attacks, and the spread of malicious software by allowing only authorized and safe connections.

The role of a bouncer is not only to deny entry to those who pose a security risk, but also to monitor the behavior of individuals within the venue, intervening when necessary. Similarly, a well-managed firewall not only filters incoming and outgoing network traffic but also monitors for suspicious or potentially harmful activities, triggering alerts or blocking malicious attempts.

Implementing and managing a firewall on servers is an essential security practice that significantly enhances server protection. By controlling network traffic, preventing unauthorized access, and filtering malicious activity, firewalls play a crucial role in safeguarding servers and the sensitive data they store. I recommend you incorporate the best practices outlined in this blog to establish a robust firewall strategy, regularly update firewall rules, monitor and analyze firewall logs, and complement your firewall with additional security measures. With a well-implemented and well-managed firewall, organizations can strengthen their server security, reduce the risk of breaches, and maintain a secure digital environment.

Bryon’s Thoughts

An immensely valuable security measure to achieve this is the careful implementation and meticulous management of a firewall. CIS Safeguard 4.4 centers on this pivotal defense mechanism, stressing the crucial importance of establishing a resilient firewall configuration for our servers. By deploying a firewall, we can bolster our protective measures, thwart unauthorized access attempts, minimize the likelihood of malevolent actions, and secure our invaluable data. A firewall assumes the role of a vigilant gatekeeper, diligently monitoring and filtering network traffic to facilitate legitimate connections while actively thwarting unauthorized access endeavors.

  • Assess Firewall Requirements
  • Select a Firewall Solution
  • Configure Firewall Rules and Define Access Policies
  • Enable Logging and Monitoring
  • Regularly Update Firewall Software
  • Perform Firewall Audits
  • Monitor Firewall Performance
  • Train System Administrators
  • Regularly Assess Firewall Effectiveness

Servers often store sensitive and critical data, including customer information, intellectual property, financial data, and more. Managing firewalls ensures that only authorized connections are allowed, minimizing the risk of data breaches, unauthorized access, and data exfiltration. By implementing proper firewall policies, you can restrict access to sensitive resources and reduce the attack surface for potential threats.

Here’s a link to a Secure Configuration Management Policy Template provided free of charge from the fine folks at the Center for Internet Security: https://www.cisecurity.org/insights/white-papers/secure-configuration-management-for-cis-control-4

Here’s some details on this specific Control/Safeguard. If you want more detail, DM me.

CIS Control 4 – Secure Configuration of Enterprise Assets & Software

Establish and maintain the secure configuration of enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/IoT devices; and servers) and software

(operating systems and applications).

Implementation Group 1

CIS Safeguard 4.4 - Implement and Manage a Firewall on Servers

Implement and manage a firewall on servers, where supported. Example implementations include a virtual firewall, operating system firewall, or a third-party firewall agent

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.