What are two basic rules Check Point recommends for building an effective security policy?
What are two basic rules Check Point recommends for building an effective security policy?
To build an effective security policy, Check Point recommends implementing a Cleanup Rule and a Stealth Rule. The Cleanup Rule is essential to ensure that any traffic not explicitly allowed is denied, providing a default-deny mechanism. The Stealth Rule protects the firewall itself by denying unauthorized access to the firewall's IP addresses. Together, these rules help in fortifying the security policy by covering gaps and protecting critical components.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Best-Practices-for-Access-Control-Rules.htm