{"id":4975,"date":"2018-11-20T13:22:48","date_gmt":"2018-11-20T13:22:48","guid":{"rendered":"https:\/\/cybersmart.com\/?p=4975"},"modified":"2021-10-08T11:13:42","modified_gmt":"2021-10-08T11:13:42","slug":"cyber-essentials-network-firewalls-explained","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/cyber-essentials-network-firewalls-explained\/","title":{"rendered":"Cyber Essentials Network Firewalls Explained"},"content":{"rendered":"

One of the<\/span> five major controls<\/span><\/a> for the Cyber Essentials Scheme is to configure and deploy a network firewall. A firewall is a network security system that creates a buffer zone between your company\u2019s network and external networks. In simple terms, a secure zone is created between devices in an organisation and the internet.<\/span><\/p>\n

Cyber Essentials<\/a> requires that all devices that are connected to the internet should be protected with a firewall. We will explain this requirement and how to comply with it from a non-technical perspective.<\/span><\/p>\n

Types of firewall\u00a0<\/b><\/h2>\n

Before we proceed forward, it is first important to understand the two types of firewalls that can be used. A <\/span>personal firewall <\/span><\/i>can be installed on internet-connected desktops or laptops. Typically, most operating systems come with a built-in personal firewall.<\/span><\/p>\n

A <\/span>boundary firewall <\/span><\/i>or <\/span>network firewall <\/span><\/i>can be used if you have a mix of different devices in your organisation. This provides a protective buffer around your entire network. In most cases, you need to set up a hardware firewall i.e. dedicated firewall machine to deploy a boundary firewall.<\/span><\/p>\n

Understanding how firewalls work<\/b><\/h2>\n

A point-of-entry for attackers is when devices communicate with other devices and services across networks. If you can restrict access to this communication, the risks of attacks are reduced. Firewalls can help you achieve this by ensuring that only safe and necessary network services can be accessed via external networks such as the internet.<\/span><\/p>\n

A network firewall is a dedicated network device that restricts the inbound and outbound network traffic to external devices and services. It prevents desktops, laptops, and mobile devices within a network from accessing malicious or harmful traffic.<\/span><\/p>\n

Firewalls achieve this accomplish this by implementing restrictions that are known as firewall rules. These rules allow or block incoming traffic into a network depending on its source, destination, and communication protocol.<\/span><\/p>\n

Firewall requirements of Cyber Essentials<\/b><\/h2>\n

The Cyber Essentials certification requires businesses to use and configure a firewall to protect all devices, particularly the ones that are connected to public or untrusted Wi-Fi networks. Every device in this scope must be protected by a properly configured firewall.<\/span><\/p>\n

To comply with Cyber Essentials, organisations must:<\/span><\/p>\n