Frequency:
Annual
Prerequisites:
- Book Of Knowledge Training
- FW.Noc training
- DNS/GTIPAM cleanup complete
- Host, Server, and endpoint are used interchangeably. The column in FW Noc says server although it is for any endpoint.
- Firewall reviews are saved in Dropbox under cybersecurity.
- Legend: red – firewall issues, violet- Vulnerabilities, yellow-excluded endpoints, light blue – excluded IPs with no DNS entry, Green- good or resolved.
Steps
Build an updated List
- Navigate to https://fw.noc.gatech.edu/
- COC firewalls located under FW Auditing
- Firewall Review Scores are based on Vulnerabilities. As resolved the firewall list will change order.
- Highlight and copy all firewalls and paste them to Excel so none are skipped.
- Delete columns “B” and “C” in Excel.
- Use the previous year’s review for a template and example.
- Open Firewalls one at a time.
- Tasks
- Click SS Edit or hyperlink in the server column that says “Scanned- Found Vulnerabilities.”
- Select “Scan HOST + Update Status and Report.”
- If there are still Vulnerabilities select “Generate Report for Viewing.”
- Open the report and save it.
- Open the RT ticket and list all level 3,4, and 5 vulnerabilities with their potential solutions including the potential ones in the comment field.
- List the RT ticket number in Excel for tracking.
- Discuss findings with TSO.
- All Excluded servers will need a new PER. This includes any TSO subnets that are excluded. Update the PER with new numbers.
- Determine who is responsible for the vulnerability and assign cases accordingly.
- Reach out to users with risky rules to ensure they are still needed. If not change per request. This should have an RT case for tracking.
- Closing Vulnerabilities requires a compensating control, PER, or some other mitigating control for acceptance.
- If using a PER, choose the ignore score, choose other from the selection box, and enter PER number.
- If choosing to accept due to compensating control, choose it from the dropdown.
- Note that if other vulnerabilities are ignored then, accepting them will cause them to show and it works in a circle. Always choose to show ignored vulnerabilities so they can be accepted again as well.
- If Vulnerability is mitigated, then a rescan will clear it.
- If using the hyperlink to see the vulnerability, then it is required to choose the update scan and report button to clear the vulnerability score.
- Work on any additional issues and resolve them.
- Save the list in Firewall reviews.
- Archive the previous year’s review.
List all default rules for firewalls
- Rules in Default should apply to all hosts or a majority of them
- If using default rules for the majority of servers, each one not needing them must be set to deny for Implicit deny being maintained.
- Review rules with TSO
- Any changes removing default rules, require reaching out to contact endpoints in the subnet to ensure they do not need rules. If so, then will need to add it to the endpoint.
- Save the final in the Firewall review drop box as well.
- Rules in Default should apply to all hosts or a majority of them
Identifier Categories
Specific categories