Geng Started with the BPA 10.2 docs.paloaltonetworks.com Contact Informaon Corporate Headquarters: Palo Alto Networks 3000 Tannery Way Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-support.html About the Documentaon • For the most recent version of this guide or for access to related documentaon, visit the Technical Documentaon portal docs.paloaltonetworks.com. • To search for a specific topic, go to our search page docs.paloaltonetworks.com/search.html. • Have feedback or quesons for us? Leave a comment on any page in the portal, or write to us at documentaon@paloaltonetworks.com. Copyright Palo Alto Networks, Inc. www.paloaltonetworks.com ©2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/ trademarks.html. All other marks menoned herein may be trademarks of their respecve companies. Last Revised May 13, 2022 Geng Started with the BPA Version 10.2 2 ©2022 Palo Alto Networks, Inc. Table of Contents Evaluate Security Policy Capability Adopon............................................. 5 Review the Adopon Summary............................................................................................... 6 Idenfy Gaps in Adopon......................................................................................................... 9 Idenfy Rules to Improve........................................................................................................18 Evaluate Best Pracce Configuraon......................................................... 21 Review the Best Pracce Summary......................................................................................22 Review Best Pracce Policy Configuraon......................................................................... 24 Review Best Pracce Objects Configuraon......................................................................26 Review Best Pracce Network Configuraon....................................................................28 Review Best Pracce Device and Panorama Management Configuraon...................29 Priorize Best Pracce Changes..................................................................31 Strengthen Device Management Posture............................................................................32 Improve Visibility into Traffic..................................................................................................33 Implement Inial Best Pracce Controls............................................................................. 35 Fine-Tune and Enhance Best Pracce Controls.................................................................36 Geng Started with the BPA Version 10.2 3 ©2022 Palo Alto Networks, Inc. Table of Contents Geng Started with the BPA Version 10.2 4 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon The Best Pracce Assessment (BPA) tool helps you understand your current level of Security policy capability adopon and helps you assess the maturity and effecveness of your security posture. Adopng capabilies such as WildFire, Vulnerability Protecon, SSL Decrypon, etc., contributes to detecng and prevenng aacks. Developing a solid understanding of how and where to use each capability in different environments is crical to understanding how to best protect your network and its valuable assets. Geng Started with Best Pracces shows how to access and run the BPA. The Capability Adopon Heatmaps secon of the BPA report enables you to review the adopon of these capabilies across the Security policy rulebase. Watch the Introducon to Heatmaps video to learn about Heatmaps, and take advantage of the BPA video library and the BPA+ video library to learn more about the tool. In Panorama-managed environments, Panorama may manage large numbers of next-generaon firewalls. Should you run the BPA on Panorama or on each individual firewall? The tradeoff is speed and convenience versus completeness. Running the BPA on Panorama is fast, convenient, and assesses most of the capabilies of the managed firewalls, but does not examine local firewall overrides. Running the BPA on each managed firewall assesses the complete configuraon (including local overrides) but takes much more me. The most praccal method is to run the BPA on Panorama first. Examine the results, decide if you need to focus on any parcular managed devices, and then run the BPA on those devices. This method saves me while sll focusing on relevant informaon that enables you to improve your security posture. Review and analyze the informaon on the Heatmap tabs to idenfy gaps in security capability adopon and determine what you want to improve: > Review the Adopon Summary > Idenfy Gaps in Adopon > Idenfy Rules to Improve 5 Evaluate Security Policy Capability Adopon Review the Adopon Summary Aer you or your Palo Alto Networks representave run the BPA, the resulng HTML report opens on the Adopon Heatmap page, in the Adopon Summary. The Adopon Summary view provides an overview of your device’s overall adopon of security capabilies. The report shows the current adopon percentage for each metric (except Industry Average, which provides the adopon averages in your industry), and in parentheses, the percentage change in adopon since the last me you ran the BPA on the device’s configuraon file (or No change if the value is the same as the last me you ran the BPA). Overall Adopon—Adopon of Security profiles in Security policy allow rules. Percentages are based on the number of allow rules that have one or more profiles enabled as part of the rule. The BPA doesn’t count disabled rules or block rules. Industry Average—Average adopon of Security profiles in allow rules for your company’s industry. Best Pracce Mode—Adopon of Security profiles configured in the recommended best pracce manner in allow rules. The BPA only counts rules with profiles that pass all best pracce checks. Geng Started with the BPA Version 10.2 6 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon App-ID Adopon—Adopon of App-ID across Security policy rules. The percentage value is based on the total number of allow rules with one or more defined applicaon (the Applicaon is not any). The BPA doesn’t count disabled rules. User-ID Adopon—Adopon of User-ID across Security policy rules. The percentage value is based on the total number of allow rules with users (including the values known-user and unknown) or user groups. The BPA doesn’t count disabled rules. Service/Port Adopon—Adopon of service/port across Security policy rules. The percentage value is based on the total number of allow rules with a defined service or port (the Service is not any). The BPA doesn’t count disabled rules. The BPA doesn’t count App-ID, User-ID, or Service/Port adopon for block rules because the raonale for blocking differs from business to business, so the BPA can’t make recommendaons based on block rules. Logging Adopon—Adopon of Log at Session End across Security policy rules. The percentage value is based on the total number of rules with Log at Session End enabled. The BPA doesn’t count disabled rules. Log Forwarding Adopon—Adopon of Log Forwarding profiles across Security policy rules. The percentage value is based on the total number of rules with a Log Forwarding profile configured. The BPA doesn’t count disabled rules. Zone Protecon Adopon—Adopon of Zone protecon across Security policy allow rules. The percentage value is based on the total number of allow rules in which the source zone has a Zone Protecon profile configured. The BPA doesn’t count disabled rules. For each of these metrics, the value in parentheses next to each percentage is the percentage change in adopon since the last me you ran the BPA on the device’s configuraon file (or No change if the value is the same as the last me you ran the BPA). Decrypon Summary—Shows if the configuraon includes Decrypon policy rules for SSL Forward Proxy, SSL Inbound Inspecon, and SSH Proxy. The summary also shows if the configuraon includes Decrypon profiles and idenfies URL categories that the device exempts from decrypon. Geng Started with the BPA Version 10.2 7 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon If you don’t decrypt a URL category (or individual applicaons), you can’t inspect its traffic because the firewall can’t see what’s inside the encrypted traffic. The firewall can only inspect traffic you decrypt. Next: Idenfy Gaps in Adopon to understand where you can improve security. Geng Started with the BPA Version 10.2 8 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon Idenfy Gaps in Adopon The Adopon Heatmap opons show where your security policy is strong and where there are gaps in security policy capability adopon that you can focus on improving. To gain maximum visibility into traffic and maximum protecon against aacks, set goals for security capability adopon and use the following recommendaons as a best pracce baseline. Assess your current posture against the baseline to idenfy gaps in security policy capability adopon. Adopon Heatmaps help idenfy devices, zones, and areas where you can improve security policy capability adopon. You can review adopon informaon by Device Group, Serial Number & Vsys, Zones, Areas of Architecture, Tags, Rule Details, and Zone Mappings. Local Filters filter on Device Group, Source Area of Architecture, Desnaon Area of Architecture, Target, Source Zone, Desnaon Zone, and Tags to narrow the scope and idenfy gaps. The following shows the Adopon Heatmap by Area of Architecture (Adopon Heatmap > Areas of Architecure): Geng Started with the BPA Version 10.2 9 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon Geng Started with the BPA Version 10.2 10 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon In Adopon Heatmap > Summary, click Adopon Summary to check the adopon rates of the following capabilies. Use the recommendaons as gap idenficaon criteria—if the actual adopon rate doesn’t match the recommendaons, plan to close the gap: Geng Started with the BPA Version 10.2 11 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon Apply WildFire, Anvirus, An-Spyware, Vulnerability Protecon, and File Blocking security profiles to all rules that allow traffic, with a target of 100% or almost 100% adopon. If you don’t apply a profile to an allow rule, ensure that there is a good business reason not to apply the profile. Configuring security profiles on all allow rules enables the firewall to inspect decrypted traffic for threats, regardless of applicaon or service/port. Aer updang the configuraon, run the BPA to measure progress and to catch new rules that don’t have security profiles aached. You can apply WildFire profiles to rules without a WildFire license. Coverage is limited to PE files, but this sll provides useful visibility into unknown malicious files. In the An-Spyware profile, apply DNS Sinkhole to all rules to prevent compromised internal hosts from sending DNS queries for malicious and custom domains, to idenfy and track the potenally compromised hosts, and to avoid gaps in DNS inspecon. Enabling DNS Sinkhole protects your network without affecng availability, so you can and should enable it right away. Apply URL Filtering and Credenal The (phishing) Protecon to all outbound internet traffic. In the Adopon Summary’s Applicaon & User Control Adopon Summary, check the adopon rates of the following capabilies. Use the recommendaons as gap idenficaon criteria—if the actual adopon rate doesn’t match the recommendaons, plan to close the gap: Apply App-ID to as close to 100% of the rules as possible. Apply User-ID to all rules with source zones or address ranges that have a user presence (some zones may not have user sources; for example, sources in data center zones should be servers and not users). Leverage App-ID and User-ID to create policies that allow appropriate users to sanconed (and tolerated) applicaons. Explicitly block malicious and unwanted applicaons. Target 100% or close to 100% service/port adopon—don’t allow applicaons on non-standard ports unless there’s a good business reason for it. In the Adopon Summary’s Logging & Zone Protecon Adopon Summary, check the adopon rates of the following capabilies. Use the recommendaons as gap idenficaon criteria—if the actual adopon rate doesn’t match the recommendaons, plan to close the gap: Geng Started with the BPA Version 10.2 12 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon Target at or close to 100% adopon for Logging and Log Forwarding. Configure Zone protecon profiles on all zones. In summary: Feature Adopon Goal WildFire As close to 100% of Security policy rules as possible Anvirus As close to 100% of Security policy rules as possible An-Spyware As close to 100% of Security policy rules as possible Vulnerability As close to 100% of Security policy rules as possible File Blocking As close to 100% of Security policy rules as possible URL Filtering and Credenal The All outbound internet traffic App-ID As close to 100% of Security policy rules as possible User-ID All rules with source zones or address ranges that have a user presence Service/port As close to 100% of Security policy rules as possible Logging As close to 100% of Security policy rules as possible Log Forwarding As close to 100% of Security policy rules as possible Geng Started with the BPA Version 10.2 13 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon Feature Adopon Goal Zone protecon All zones When viewing Adopon Heatmaps, use Local Filters to narrow the scope. Use the resulng informaon to idenfy gaps in security policy capability, measure against gap-idenficaon criteria, and refine or establish new gap-idenficaon criteria for further invesgaon. For example, to create a filter that displays adopon of rules that control traffic to the internet Area of Architecture: STEP 1 | Select Adopon Heatmap > Areas of Architecture. STEP 2 | Click Local Filters to expand the filter opons. STEP 3 | Set the Desnaon Area of Architecture to Internet. Geng Started with the BPA Version 10.2 14 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon STEP 4 | Click Apply. The BPA filters the results: Geng Started with the BPA Version 10.2 15 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon Geng Started with the BPA Version 10.2 16 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon Interpret the results based on your security goals and criteria. For example, if your goal is to apply WildFire to 100% of your allow rules, the filtered Adopon Heatmap reveals that only 50% of your DMZ allow rules have WildFire profiles, so you have idenfied a gap to target for improvement. STEP 5 | Next: Idenfy Rules to Improve. Geng Started with the BPA Version 10.2 17 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon Idenfy Rules to Improve Aer you idenfy a gap in security policy capability adopon, use the Adopon Heatmap > Rule Detail view to list rules that require further invesgaon or remediaon. Configure Local Filters to match the gap idenficaon criteria you developed when you idenfied gaps in adopon. This results in rule lists you can export and hand off to the operaonal team in charge of firewall Security policy. For example, to create a Rule Detail filter to idenfy rules that allow all traffic and don’t have a Vulnerability Protecon profile configured: STEP 1 | From the Adopon Heatmap menu, select Rule Detail to view the Rule Details page. Geng Started with the BPA Version 10.2 18 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon STEP 2 | Click Local Filters to view the filter opons and then select the following filters: • Source Zone = any • Desnaon Zone = any • Source Address Configured = No • Desnaon Address Configured = No • Acon = allow • Rule Enabled = Yes • Vulnerability On = No STEP 3 | Click Apply Filters. The BPA lists the rules that match the filters: STEP 4 | To export the filtered rule list to a .csv file, click Export Data. Geng Started with the BPA Version 10.2 19 ©2022 Palo Alto Networks, Inc. Evaluate Security Policy Capability Adopon STEP 5 | Next: Evaluate Best Pracce Configuraon. Geng Started with the BPA Version 10.2 20 ©2022 Palo Alto Networks, Inc. Evaluate Best Pracce Configuraon The Best Pracce Assessment (BPA) tool helps you understand the current level of best pracce configuraon in your Security policy so you can assess the maturity of your security posture. Watch the Introducon to the BPA video to learn about the BPA, and take advantage of the BPA video library and the BPA+ video library to learn even more about the tool. The BPA report opens first on the Adopon Heatmap page. Click the Best Pracce Assessment to view the BPA secon of the report, which focuses on the adopon of configuraon best pracces for next-generaon firewalls and Panorama. In addion to this documentaon, you can view the BPA demo and a short video about how to run a BPA to learn more about using the BPA. A BPA report evaluates a next-generaon firewall or Panorama configuraon file against more than 200 best pracce checks. The BPA groups the results of the evaluaon by policies, objects, network, and device/Panorama informaon, similar to the PAN-OS user interface. In Panorama-managed environments, Panorama may manage large numbers of next-generaon firewalls. Should you run the BPA on Panorama or on each individual firewall? The tradeoff is speed and convenience versus completeness. Running the BPA on Panorama is fast, convenient, and assesses most of the capabilies of the managed firewalls, but does not examine local firewall overrides. Running the BPA on each managed firewall assesses the complete configuraon (including local overrides) but takes much more me. The most praccal method is to run the BPA on Panorama first. Examine the results, decide if you need to focus on any parcular managed devices, and then run the BPA on those devices. This method saves me while sll focusing on relevant informaon that enables you to improve your security posture. Review and analyze the informaon to find areas to focus on and improve: > Review the Best Pracce Summary > Review Best Pracce Policy Configuraon > Review Best Pracce Objects Configuraon > Review Best Pracce Network Configuraon > Review Best Pracce Device and Panorama Management Configuraon 21 Evaluate Best Pracce Configuraon Review the Best Pracce Summary Select Summary from the Best Pracce Assessment menu to view the Best Pracce Summary. The summary presents best pracce configuraon check results mapped to the control categories of industry standards, such as the Center for Internet Security’s (CIS) Crical Security Controls and the Naonal Instute of Standards and Technology (NIST) publicaon on Security Controls and Assessment Procedures. The purpose of this informaon is to provide a good way to learn how BPA checks e to industry standards, not to act as an audit. Like the Adopon Summary, the Best Pracce Summary includes metrics that show your current adopon rate and adopon progress (in parentheses) since the last me you generated the BPA on the device’s configuraon. Click Mapping Definions (le sidebar) to see a complete list of all of the mapped checks and their individual scores. Show Filters to set filters, Apply Filters to the output, and Export Mappings to export the mappings to a .csv file. Geng Started with the BPA Version 10.2 22 ©2022 Palo Alto Networks, Inc. Evaluate Best Pracce Configuraon Next: Review Best Pracce Policy Configuraon. Geng Started with the BPA Version 10.2 23 ©2022 Palo Alto Networks, Inc. Evaluate Best Pracce Configuraon Review Best Pracce Policy Configuraon Best Pracce Assessment > Policies shows all checks related to different types of firewall policies and begins on the Security Rulebase checks page. Security Rulebase checks summarizes the best pracce check results by device group, with a pass/fail status and recommendaons for what to do about failed checks. Click help ( ) to view the descripon of and raonale for each result, along with a link to technical documentaon for reference. Select the type of policy you want to review from the le menu to idenfy potenal rule improvements. For example, Security Rule Checks displays rule-based check results. Click Local Filters to configure filters that narrow the results to rules that failed one or more parcular checks. You can Export Data to export the list to a .csv file for remediaon analysis. Geng Started with the BPA Version 10.2 24 ©2022 Palo Alto Networks, Inc. Evaluate Best Pracce Configuraon When you review Policy informaon, at a minimum, review the following items to help understand the scope of policy remediaon (switch between views): Security—Idenfy rules that fail the Source/Desnaon !=any/any check. Security—Idenfy rules that fail the App-ID with Service check. Security—Idenfy User-ID rules that fail the User-ID Rules without User ID enabled on Zone check. Decrypon Rulebase—SSH Proxy decrypon checks. Decrypon—Each Decrypon policy rule should have an associated Decrypon profile. The excepon is TLSv1.3 traffic that you choose not to decrypt by applying a No Decrypon policy to the traffic. When you aach a No Decrypon profile to the policy, the profile checks cerficate informaon and blocks decrypon sessions that use bad cerficates. However, because TLSv1.3 encrypts cerficate informaon, the firewall cannot block undecrypted traffic based on cerficate informaon, so there is no point to aaching the profile to the policy. Applicaon Override—Applicaon Override rules that use a simple custom applicaon bypass Layer 7 inspecon for matching traffic. Reduce or eliminate Applicaon Override rules that use a simple custom applicaon so you can Improve Visibility into Traffic and inspect the applicaons and content these rules control. Next: Review Best Pracce Objects Configuraon. Geng Started with the BPA Version 10.2 25 ©2022 Palo Alto Networks, Inc. Evaluate Best Pracce Configuraon Review Best Pracce Objects Configuraon Best Pracce Assessment > Objects shows all checks related to different types of firewall objects, and begins on the Applicaon Filters page. Select the object you want to review to understand the exisng configuraon and to idenfy potenal gaps in best pracce configuraon related to Applicaon Filters, Tags, GlobalProtect, Security profiles, Log Forwarding, and Decrypon profiles. The following example shows the result when you select the Anvirus Security profile object. For each Anvirus profile, the report shows the current configuraon and how many rules use the profile. The report shows the best pracce check results below the current configuraon with pass/fail status and recommendaons for failed best pracce checks. Click help ( ) for the raonale for each check and links to best pracce documentaon. When one or more checks fail, the profile tle turns red. The report lists profiles that aren’t in use at the boom with a yellow tle. The “QS” buon next to some of the profile page links on the le of the screen connect you to the QuickStart Service opons. The QuickStart Service helps you increase your security capabilies and investments by helping you plan and execute your firewall-as-a-plaorm implementaon. The Self-guided Documents help you understand, create, and deploy the object. Geng Started with the BPA Version 10.2 26 ©2022 Palo Alto Networks, Inc. Evaluate Best Pracce Configuraon When you review the Objects tab, at a minimum, review the following items to help understand the potenal scope of remediaon: Anvirus—Decoder acons for both Anvirus and WildFire. An-Spyware—Strict Profile, DNS Sinkhole. Vulnerability Protecon—Strict Profile. URL Filtering—Whether known bad categories are blocked. WildFire Analysis—Profile File Types (all types should be sent to WildFire for analysis). Log Forwarding—Whether all log types are forwarded (forward all log types). Next: Review Best Pracce Network Configuraon. Geng Started with the BPA Version 10.2 27 ©2022 Palo Alto Networks, Inc. Evaluate Best Pracce Configuraon Review Best Pracce Network Configuraon Best Pracce Assessment > Network shows all checks for network-related configuraon and begins on the Zones page. On the le nav, select the network check you want to review to understand the exisng configuraon and to idenfy potenal gaps in best pracce configuraon related to Zones, GRE Tunnels, and to GlobalProtect, IPsec Crypto, Interface Management, and Zone Protecon profiles. The following example shows the result for Zones. The report shows the current configuraon for each item. The best pracce check results for each item appears below its current configuraon. You can specify a Device Group and/or Template to limit the scope of the informaon displayed. Each check has pass/fail status and recommendaons for failed best pracce checks. Click help ( ) for the raonale for each check and links to best pracce documentaon. When one or more checks fail, the item’s tle turns red. When you review the Network tab, at a minimum, review the following items to help understand the potenal scope of remediaon: Zones—Whether each zone has Packet Buffer Protecon enabled and has a Zone Protecon profile. Zone Protecon—Whether Flood Protecon and Packet-Based Aack Protecon are enabled. Next: Review Best Pracce Device and Panorama Management Configuraon. Geng Started with the BPA Version 10.2 28 ©2022 Palo Alto Networks, Inc. Evaluate Best Pracce Configuraon Review Best Pracce Device and Panorama Management Configuraon Best Pracce Assessment > Device and Best Pracce Assessment > Panorama pages show all checks related to device management setup and configuraon. On standalone firewalls, Best Pracce Assessment > Device begins on the firewall device’s General Sengs for Management Setup page. On Panorama, Best Pracce Assessment > Device begins on the page that shows general sengs for each template stack. Best Pracce Assessment > Panorama begins on the device’s General Sengs for Management Setup page. Select the check you want to review to understand the exisng configuraon and to idenfy potenal gaps in best pracce configuraon related to firewall and Panorama device management. The following example shows the result for General Sengs on a Panorama device. The report shows the current configuraon for each item. The best pracce check results for each item appears below its current configuraon. When viewing informaon for a Device, you can specify a Template to limit the scope of the informaon displayed. Each check has pass/fail status and recommendaons for failed best pracce checks. Click help ( ) for the raonale for each check and links to best pracce documentaon. When one or more checks fail, the item’s tle turns red. When you review the Device or Panorama tab, at a minimum, review the following items to help understand the potenal scope of remediaon: Dynamic Updates—Anvirus, Apps, Threats, and WildFire updates. Management Interface Sengs—Network Connecvity Services, Permied IP Addresses. Administrators—Local Admins, Administrator Password profile. Check Device > Administrators or Panorama > Administrators to ensure Administrators’ passwords are configured with the minimum required complexity. Minimum Password Complexity—Password minimum complexity requirements check. Next: Priorize Best Pracce Changes. Geng Started with the BPA Version 10.2 29 ©2022 Palo Alto Networks, Inc. Evaluate Best Pracce Configuraon Geng Started with the BPA Version 10.2 30 ©2022 Palo Alto Networks, Inc. Priorize Best Pracce Changes The amount of informaon in a BPA report can be overwhelming. This chapter provides recommendaons to help you priorize improvement to your configuraon so you can close security gaps, implement the highest-value enhancements first, and make progress toward achieving a best pracce security posture. In Panorama-managed environments, Panorama may manage large numbers of next-generaon firewalls. Should you run the BPA on Panorama or on each individual firewall? The tradeoff is speed and convenience versus completeness. Running the BPA on Panorama is fast, convenient, and assesses most of the capabilies of the managed firewalls, but does not examine local firewall overrides. Running the BPA on each managed firewall assesses the complete configuraon (including local overrides) but takes much more me. The most praccal method is to run the BPA on Panorama first. Examine the results, decide if you need to focus on any parcular managed devices, and then run the BPA on those devices. This method saves me while sll focusing on relevant informaon that enables you to improve your security posture. The following topics focus on how to improve your security posture in the order in which new deployments are usually implemented, focusing on management first, then visibility, control, and enforcement. Exisng deployments already may have achieved some maturity in each area. > Strengthen Device Management Posture > Improve Visibility into Traffic > Implement Inial Best Pracce Controls > Fine-Tune and Enhance Best Pracce Controls 31 Priorize Best Pracce Changes Strengthen Device Management Posture Strengthening your device management posture secures the firewall by prevenng unauthorized access that could compromise it, reduces the operaonal impact of unexpected events, and provides greater visibility into firewall operaon. Follow the Adminstrave Access Best Pracces to prevent unauthorized and unsecured access to the device’s management interface. Forward all system and configuraon logs to Panorama and to third-party monitoring soluons to keep track of system-related events and configuraon changes. Create a configuraon backup schedule so you can remediate configuraon-related issues and system outages faster. Aer you configure changes, Run the BPA to validate the changes, measure progress, and priorize the next changes. Next: Improve Visibility into Traffic. Geng Started with the BPA Version 10.2 32 ©2022 Palo Alto Networks, Inc. Priorize Best Pracce Changes Improve Visibility into Traffic You can’t protect yourself against threats you can’t see, so you must ensure you have full visibility into traffic, across all users and applicaons, at all mes. Complete visibility into the applicaons, content, and users on your network is the first step toward informed policy control: Maximize Security profile adopon. Aer you Review the Adopon Summary and idenfy gaps in adopon, remediate the gaps using the safe transion steps to move toward a full best pracce Security profile implementaon. Maximize Logging adopon (including Log Forwarding) across the Security policy rulebase to inspect all traffic. Configure best pracces for dynamic content updates to ensure the firewall has the latest applicaon and threat signatures to protect your network and that you deploy updates based on your network security and availability requirements. Plan your SSL Decrypon deployment based on best pracces. Enable User-ID in user zones (internal, trusted zones from which users iniate traffic) to map applicaon traffic and associated threats to users and devices. Don’t enable User-ID in external untrusted zones. If you enable User-ID (or client probing such as WMI) on an external untrusted zone, probes could be sent outside your protected network and expose User-ID informaon such as the User-ID Agent service account name, domain name, and encrypted password hash, which could enable an aacker to compromise your network. Reduce or eliminate Applicaon Override rules so you can inspect the applicaons and content these rules control (an Applicaon Override rule is a layer 4 rule that doesn’t allow the firewall to inspect the traffic). Eliminate the need for or reduce the scope of basic Applicaon Override rules: • Validate whether the use case for the rule sll exists. Oen, an Applicaon Override rule was created to overcome a specific issue related to performance, protocol decoders, or unknown applicaons. Over me, PAN-OS updates, content updates, or hardware upgrades may remove the need for some Applicaon Override rules. If you run PAN-OS 9.0 or later on firewalls or PAN-OS 9.0 or later on a Panorama managing firewalls running PAN-OS 8.1 (or later), you can use Policy Opmizer to transform the rule to a layer 7 rule. • Reduce the scope of the Applicaon Override rule so it only affects the minimum possible amount of traffic. Rules that are defined too broadly may override more traffic than necessary or intended. Define source and desnaon zones, address, and/or ports in each Applicaon Override rule to limit the rule’s scope as much as possible. • Create layer 7 custom applicaons for internal applicaons. • Create Service objects with custom meout values. Plan to deploy DoS and Zone Protecon and take baseline CPS measurements so you can set reasonable flood protecon thresholds. When you implement these nave App-ID, Content-ID, User-ID, and SSL Decrypon capabilies, the firewall gains visibility into and can inspect all of your traffic—applicaons, threats, and content —and e events to the user, regardless of locaon, device type, port, encrypon, or an aacker’s evasive techniques. Geng Started with the BPA Version 10.2 33 ©2022 Palo Alto Networks, Inc. Priorize Best Pracce Changes Improving the adopon of capabilies such as SSL Decrypon, logging, flood protecon, Security profiles, etc., may result in addional firewall resource consumpon. Understand the capacity of your firewalls and ensure they’re properly sized to handle any addional load. Your Palo Alto Networks SE or CE can help you size the deployment. You also may need addional log storage space. Aer you configure changes, Run the BPA to validate the changes, measure progress, and priorize the next changes. Next: Implement Inial Best Pracce Controls. Geng Started with the BPA Version 10.2 34 ©2022 Palo Alto Networks, Inc. Priorize Best Pracce Changes Implement Inial Best Pracce Controls Aer you gain visibility and context into the traffic on your network—applicaons, content, threats, and users—implement strict controls to reduce the aack surface and prevent known and unknown threats to complete the transion to a best pracce configuraon. Aer you Review the Adopon Summary and idenfy gaps in adopon, follow the safe transion steps to move toward best pracce Security profiles to block threats and reduce the aack surface, including implemenng strict controls in the data center to protect the most valuable assets of your business. Create applicaon-based Security policy rules for data center and perimeter firewalls; use the perimeter firewall best pracce recommendaons for other firewalls that aren’t in the data center. If you run PAN-OS 9.0 or later on firewalls or PAN-OS 9.0 or later on a Panorama managing firewalls running PAN-OS 8.1 (or later), you can use Policy Opmizer to convert portbased rules to applicaon-based rules. Create user-based access policies. Deploy best pracce Zone Protecon profiles to all zones. Deploy SSL Decrypon so the firewall can gain visibility into (decrypt) and inspect encrypted traffic. Aer you implement control capabilies, the firewall can scan all allowed traffic and detect and block network and applicaon-layer vulnerability exploits, buffer overflows, DoS aacks, port scans, and known and unknown malware variants. The firewall controls applicaon and user access as well as blocking malicious and unwanted applicaons. Aer you configure changes, Run the BPA to validate the changes, measure progress, and priorize the next changes. Next: Fine-Tune and Enhance Best Pracce Controls. Geng Started with the BPA Version 10.2 35 ©2022 Palo Alto Networks, Inc. Priorize Best Pracce Changes Fine-Tune and Enhance Best Pracce Controls Aer you implement control over your network traffic—applicaons, content, threats, and users —start fine-tuning the controls and implement addional funconality to improve your security posture. • If you haven’t converted internal applicaons to custom applicaons to gain visibility into and control of the traffic, convert internal applicaons to custom applicaons. • Tune Security profiles to best pracces aer you use the safe transion steps to begin the move to best pracce profiles. • Block known malicious IP addresses based on threat intelligence from Palo Alto Networks and reputable third-party feeds. • Deploy GlobalProtect or Prisma Access to extend the next-generaon security plaorm to users and devices regardless of where they are located. • Enable credenal the prevenon. • Configure network-based Mul-Factor Authencaon. Next: Run the BPA to validate changes, measure progress, and priorize the next changes, learn more about best pracces, and learn more about the many security capabilies of Panorama and PAN-OS next-generaon firewalls. Geng Started with the BPA Version 10.2 36 ©2022 Palo Alto Networks, Inc.