Home > Uncategorized > How SCIP performs firewall rule auditing

How SCIP performs firewall rule auditing

I came across a very cool firewall rule auditing procedure from Marc Ruef’s twitter.

One of the most interesting things that I’ve read so far is how they weigh vulnerabilities, it is listed under a section titled Key Areas, and I won’t reproduce it here.

Seems like a good quick guideline on what to do and what not to do with Firewalls.

P.S. The rule sets here would have a low weight and most would be explicable. :)

Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: