On This Page
Best Practices Audits
Overview
Most organizations have both formal and informal IT policies. These policies include criteria for security policies, with a variety of requirements, defining what is allowed and what is not allowed in its firewall configuration and rulebases.
SecureTrack's Best Practices feature enables organizations to create best practice baseline policies, and to track violations. The administrator creates the best practice baseline policy by selecting audit checks from a list of industry best practice audit checks for firewalls.
Use Best Practices Audits
In order to maintain certain minimum security standards in different organizational areas, it is possible to create and maintain a best practices standard for each area. You can choose to run a single Best Practices audit that will apply to all monitored devices, or you may create multiple audits, where each audit will apply to different organizational areas, where each area has differing security needs.
Therefore, you can choose to audit the current active firewall policies as a first step, and subsequently you can audit firewall policies before they are installed. This is a proactive way to ensure compliance to your defined security standards.
You will be presented with the list of best security practices that are stored in the SecureTrack database, and will select which best practices are appropriate for your different organizational areas. Each Best Practices audit check is described in detail SecureTrack's web interface, along with a pre-defined severity level, and remedial steps needed to resolve configuration errors.
You can schedule pre-configured Best Practice audits with a Best Practices Audit report.
Was this helpful?
Thank you!
We’d love your feedback
We really appreciate your feedback
Send this page to a colleague