Change process
A review of the firewall change process is usually the first technical step in a firewall audit. This phase ensures that requested changes have been appropriately approved, implemented, and documented. Depending on whether you have a tool to assist you or are doing it manually, you can accomplish this in a few different ways.
- Requester's permission to submit firewall change requests documented ?
- Is there evidence of each change's risk analysis ?
- Are there valid (digital or physical) reviewer and approval signatures
- Is there an expiration date for the change
- Are the modifications in the change ticket well-documented
- Documented business reason for the change
- Is there documentation for each change's maintenance window and/or install date
- The comment on each firewall security policy rule should have at least two pieces of data: the change ID of the request and the initials of the engineer who implemented the change.
Firewall rule base
A review of the rulebase is usually the second technical step in a firewall audit (also called a policy). Because this stage has typically been difficult to do and is extremely technology-dependent, the methodology used by auditors differs greatly.