Firewall Configuration Review

The best defense against the world is a thorough knowledge of how to avoid it.
A firewall is the first set of defense in a system which prevents us from an external attack.

Get Started

Why secure the "BARRICADE" of the organization ?

Even being the first line of defense, it has its own set of weaknesses, that if not addressed, can cause havoc in the network environment. A few common weaknesses that are seen in the firewall policy are stated below, but are not limited to just these :

Firewall Policy:

A rule-set specifies what services to let through your firewall, and which ones to keep out. A rule that defines the parameters against which each connection is compared, resulting in a decision on what action to take for each connection.

Firewall Deployment:

Deploying a firewall in front of the server tends to decrease the likelihood that it will be compromised, thus decreasing its overall risk exposure. As networks become more complex and firewall rulesets grow, it is difficult to identify and quantify the risk that is introduced by misconfigured or overly permissive firewall rules. Such deployment errors could render the network vulnerable.

Services Included:

Your network is in a constant state of flux. Managing changes is a big problem. Not properly managing firewall rules and changes can lead to serious risks, from blocking legitimate traffic to going offline or even getting hacked.

Software Upgradation:

While keeping an eye on the firewall configuration and deployment, one might miss out on the necessity of an up-to-date software that is present on the perimeter. This ignorance would mean welcoming the hackers to compromise the firewall and network.

Optimizing your First Line of Automated Defense

The Firewall Configuration Review service follows a very rigorous method which performs a deep analysis of the firewall configuration. Maintaining your firewall rules is one of the most important firewall management functions, yet many businesses continue to struggle with it. The review process takes into account the following:

  • Checking for availability of vulnerability or bugs in the current hardware and software updates.
  • A full exhaustive reviewing of all the hardware devices associated within the firewall.
  • Review of accounts set up on the firewall and the OS.
  • Checking for possible hardware or software malfunctioning.
  • Scrutinizing the comments for all the rules in the ruleset for proper justification.
  • Verify if the rules provide any trivial privileges.
  • Review the firewall for al of the enabled services.
  • Review overall firewall configuration and rule sets deployed on the firewall.
  • Reviewing the vendors licensing.
  • Prioritizing recommendations related to overall device configuration.
  • Check for vulnerabilities in the encryption and hashing process.


The process carried out at Baseel takes a tool on the system with full privileges to the system’s configuration with the sole aim of providing the precise result thus attaining maximum security at the boundary itself. We deeply analyze the firewall’s entire configuration as followed by the industry's' best practices, including guidelines from PCI-DSS and Center for Internet Security and ensure compliance of the same.

Baseel believes in holistic security and hence provides equal importance to the technical, business and device aspect. At the end of the review process, a comprehensive report is published that includes every minute detail about the loopholes in the firewall environment, along with remediation steps for the findings, and a detailed configuration review of the firewall ruleset covering each assessment result.

Baseel Limited

Insight >> Integrity >> Impact >>