Iran Cyber-Response: 4 Recommendations for Defending Your Organization from Nation-State Attacks
While we offer services to review and assess firewall rules for security, if you have the resources in-house, organizations can tackle this by configuring rules to log (audit mode) temporarily and reviewing the to see which are being used. If it hasn’t already been done (and documented) further research should be done to review the in-use rules, identify the resources in play, and make sure there’s a business case documented for each policy or rule set.
Read More