Good morning friends, based on your experience:
Why is it important to not have all "ALL" ports enabled in fortigate firewall policies?
I greatly appreciate your comments.
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
In an ideal world, a firewall will strictly block everything that isn't explicitly required for things to function. This is where using the service "ALL" or src/dst address "all" is potentially over-permissive.
In the real world, where process owners don't know what IPs:ports their applications talk to, where service providers don't know where exactly they serve their services from or straight up refuse to provide this information, or where everything is vaguely served from "the cloud", it is not always possible to strictly adhere to this philosophy of "only allow what's required".
You will have to carefully find the right place where there's sufficient balance between "things working" and "unneeded/unwanted traffic blocked", and that is different for each situation.
In an ideal world, a firewall will strictly block everything that isn't explicitly required for things to function. This is where using the service "ALL" or src/dst address "all" is potentially over-permissive.
In the real world, where process owners don't know what IPs:ports their applications talk to, where service providers don't know where exactly they serve their services from or straight up refuse to provide this information, or where everything is vaguely served from "the cloud", it is not always possible to strictly adhere to this philosophy of "only allow what's required".
You will have to carefully find the right place where there's sufficient balance between "things working" and "unneeded/unwanted traffic blocked", and that is different for each situation.
One of the actual cases I saw is one company has avoided a ransomware propagation to VMware ESXi, just because they were not allowing ALL services from user VLAN to server VLAN.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1105 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.