{"id":4975,"date":"2018-11-20T13:22:48","date_gmt":"2018-11-20T13:22:48","guid":{"rendered":"https:\/\/cybersmart.com\/?p=4975"},"modified":"2021-10-08T11:13:42","modified_gmt":"2021-10-08T11:13:42","slug":"cyber-essentials-network-firewalls-explained","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/cyber-essentials-network-firewalls-explained\/","title":{"rendered":"Cyber Essentials Network Firewalls Explained"},"content":{"rendered":"
One of the<\/span> five major controls<\/span><\/a> for the Cyber Essentials Scheme is to configure and deploy a network firewall. A firewall is a network security system that creates a buffer zone between your company\u2019s network and external networks. In simple terms, a secure zone is created between devices in an organisation and the internet.<\/span><\/p>\n Cyber Essentials<\/a> requires that all devices that are connected to the internet should be protected with a firewall. We will explain this requirement and how to comply with it from a non-technical perspective.<\/span><\/p>\n Before we proceed forward, it is first important to understand the two types of firewalls that can be used. A <\/span>personal firewall <\/span><\/i>can be installed on internet-connected desktops or laptops. Typically, most operating systems come with a built-in personal firewall.<\/span><\/p>\n A <\/span>boundary firewall <\/span><\/i>or <\/span>network firewall <\/span><\/i>can be used if you have a mix of different devices in your organisation. This provides a protective buffer around your entire network. In most cases, you need to set up a hardware firewall i.e. dedicated firewall machine to deploy a boundary firewall.<\/span><\/p>\n A point-of-entry for attackers is when devices communicate with other devices and services across networks. If you can restrict access to this communication, the risks of attacks are reduced. Firewalls can help you achieve this by ensuring that only safe and necessary network services can be accessed via external networks such as the internet.<\/span><\/p>\n A network firewall is a dedicated network device that restricts the inbound and outbound network traffic to external devices and services. It prevents desktops, laptops, and mobile devices within a network from accessing malicious or harmful traffic.<\/span><\/p>\n Firewalls achieve this accomplish this by implementing restrictions that are known as firewall rules. These rules allow or block incoming traffic into a network depending on its source, destination, and communication protocol.<\/span><\/p>\n The Cyber Essentials certification requires businesses to use and configure a firewall to protect all devices, particularly the ones that are connected to public or untrusted Wi-Fi networks. Every device in this scope must be protected by a properly configured firewall.<\/span><\/p>\n To comply with Cyber Essentials, organisations must:<\/span><\/p>\n A firewall is used for securing devices within a network and mitigating the risks of outsider attacks. \u00a0Setting up a properly configured firewall is one of the first steps towards a Cyber Essentials certification. <\/span><\/p>\n If you would like to learn more about network firewalls and how to configure them for Cyber Essentials,<\/span> contact us<\/span><\/a> right away.<\/span> CyberSmart<\/span><\/a> partners with you to make your journey towards becoming a<\/span> secure and compliant organisation<\/span><\/a> simpler and easier.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":" One of the five major controls for the Cyber Essentials Scheme is to configure and deploy a network firewall. A firewall is a network security system that creates a buffer…<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4],"tags":[26,9,10,27,28,29,30,31,32,16],"yoast_head":"\nTypes of firewall\u00a0<\/b><\/h2>\n
Understanding how firewalls work<\/b><\/h2>\n
Firewall requirements of Cyber Essentials<\/b><\/h2>\n
\n
\n
Conclusion<\/b><\/h2>\n