<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: # of rules vs simplicity in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274707#M75189</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Also depends on any requirements such as compliance you might be under. For instance we are under a 'Least Privelegde, deny all allow by exception requirement. So in the example you gave, we would require two policies since combining them would be similar to permissions creep where you allow more than should be allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;</description>
    <pubDate>Wed, 03 Jul 2019 17:48:04 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2019-07-03T17:48:04Z</dc:date>
    <item>
      <title># of rules vs simplicity</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274528#M75168</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm currently reviewing our PA5250 security policy ruleset and I'm doubting the best way to handle it. We have about 800 rules and lots of those rules combine functions. For example a server is allowed to FTP to ip a.b.c.d and should be allowed to ssl to ip w.x.y.z. At the moment this is combined in one rule which means that servers is also allowed to FTP to w.x.y.z and to SSL to the first IP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I were to split up all those kind of rules I would at least double the number of rules. I know the limit of # of rules for the 5250 is 40000 so we are no where near that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My questions:&lt;/P&gt;&lt;P&gt;- from a management perspective is it better to have lots of small rules or lots of "combined" rules&lt;/P&gt;&lt;P&gt;- from a resource/throughput perspective: is it better to have for example 10000 simple rules (1 source - 1 destination) or 2000 complex rules (multiple source and destionations)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for your opinion on this topic&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 06:57:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274528#M75168</guid>
      <dc:creator>tomdevos</dc:creator>
      <dc:date>2019-07-03T06:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: # of rules vs simplicity</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274550#M75171</link>
      <description>For the chassis' performance neither situations have a huge impact, from a management perspective more rules is more complexity, but this helps the third view: security, how secure are combined rules?

it also depends on your stance, open and rely on security profiles to stop threats or restrictive and preventing threats before they happen

to help the logistical nightmare of managing hundreds or thousands of rules, there's a few things that can help like tagging your zones which helps filtering your view of the policy to the task at hand. Rule Usage and the PAN-OS 9.0 'policy optimizer' tool can help determine which rules are being used or can be improved</description>
      <pubDate>Wed, 03 Jul 2019 07:58:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274550#M75171</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-07-03T07:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: # of rules vs simplicity</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274594#M75179</link>
      <description>&lt;P&gt;from a management prospective, 1 policy, allow all.&lt;/P&gt;&lt;P&gt;from a security prospective I would not hesitate to split your example into 2 seperate&amp;nbsp;policies regardles of the sums...&lt;/P&gt;&lt;P&gt;It maybe that your servers listed are not listening on the other ports but for me it's "peace of mind" and confidence in saying "No.. Thats not possible".&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The filter option works for me to&amp;nbsp;only see&amp;nbsp;the policies needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;there are of course many reasons to combine policies but not for ease of management over security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 11:58:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274594#M75179</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-07-03T11:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: # of rules vs simplicity</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274603#M75181</link>
      <description>&lt;P&gt;This is a great question, and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp; and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp; both had great feedback.&amp;nbsp; Another thing to consider is support ability and technical capability of the staff administering the box.&amp;nbsp; If the techs looking into potential firewall problems are senior staff with 9+ years experience then the more complex rule base shouldn't cause a problem in the slightest.&amp;nbsp; However if you have more junior less seasoned people administering&amp;nbsp;the FW then a simpler more straightforward policy base might be more appropriate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're using IP definition in at least one direction, application based policy that's using application-default, threat features enabled, and SSL decryption there might not be as great of a risk combing 'like' requirements into one rule versus breaking out that one rule into 20+.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think there are many factors that can lead an admin towards one direction or another; complex or simple rule base, if the admin of the box can't discern scope and intent of a firewall rule then that network&amp;nbsp;is going to inherently&amp;nbsp;be less secure and more vulnerable.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 12:30:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274603#M75181</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-07-03T12:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: # of rules vs simplicity</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274707#M75189</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Also depends on any requirements such as compliance you might be under. For instance we are under a 'Least Privelegde, deny all allow by exception requirement. So in the example you gave, we would require two policies since combining them would be similar to permissions creep where you allow more than should be allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 17:48:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/274707#M75189</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-07-03T17:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: # of rules vs simplicity</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/277094#M75416</link>
      <description>&lt;P&gt;complexity is the enemy of security?&amp;nbsp; This is great discussion....it gets harder to manage the larger the ruleset gets I think.&amp;nbsp; Keeping things simple in a complex world is a challenge&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 17:31:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/of-rules-vs-simplicity/m-p/277094#M75416</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2019-07-17T17:31:06Z</dc:date>
    </item>
  </channel>
</rss>

