First-time poster exploring best practices for security design in PAN-OS environments

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Palo Alto Networks Approved
Palo Alto Networks Approved
Community Expert Verified
Community Expert Verified

First-time poster exploring best practices for security design in PAN-OS environments

L1 Bithead

Hi everyone,

I’m new to the **Palo Alto Networks community and currently learning my way around firewall policy design and general architecture concepts.

Right now I’m trying to better understand how experienced engineers approach things like:

  • structuring security policies in a clean and scalable way
  • balancing simplicity vs. granularity in rule design
  • avoiding “rule sprawl” in growing environments
  • and best practices for maintaining visibility without overcomplicating configs

I’m still at the learning stage, so I’m focusing on building good habits early rather than just making things work.

If anyone has advice, common mistakes to avoid, or recommended learning paths, I’d really appreciate it.

Looking forward to learning from the community and gradually improving my understanding.

Thanks in advance!

 
 
2 REPLIES 2

Cyber Elite

Hi @hellencharless54 ,

 

I love your focus on "building good habits"!  Let me share what works for me:

"structuring security policies in a clean and scalable way"

I like to group similar rules together: inbound, DMZ, outbound, etc.  That works for me.  The Day 1 Configuration even has tags for Inbound, Outbound, Internal, etc.  These tags make the grouping easy.  You could even use the Group Rules By Tag field and the Rulebase By Groups option on the bottom to view only sections of the security policy at a time.

Use a whitelist (only allow specific traffic) whenever possible, but for outbound traffic an allow all rule coupled with a blacklist is more manageable.  An outbound whitelist can be done for critical assets.

"balancing simplicity vs. granularity in rule design"

The security policy rule should be specific enough to allow only the desired traffic.  If you want to allow SQL traffic to MS SQL servers, you should include the destination zone, destination objects, mssql-db application, and application-default service as a minimum.  You could also include source zones, subnets, or even users if you have User-ID.  A more specific rule is more secure.

Here are some other rules I have for rules:

  • Always use application-default or specific ports with applications.  Otherwise, the NGFW will allow a few packets through on all ports as it tries to identify the application.
  • Do not block by application, but by port.  Otherwise, the NGFW will allow a few packets through as it tries to identify the application.
  • L7 rules are more secure than L4 rules. The Policy Optimizer makes L7 rules easy.
  • Use Security Profile Groups rather than specific Security Profiles in rules to make changes much easier.  The Day 1 Configuration has excellent Security Profile Groups.
  • If a zone only has 1 subnet, I usually do not add the subnet to the rule.  It's not needed.

'avoiding “rule sprawl” in growing environments'

This is a great place to start.  https://docs.paloaltonetworks.com/best-practices

Some good sections for you are "Security Policy Best Practices," "Internet Gateway Best Practice Security Policy," and "Data Center Best Practice Security Policy."  There is even a section on "avoiding rulebase bloat" under Security Policy Best Practices > Security Policy Rulebase Best Practices.  If much of the configuration matches in separate rules, it may be good to combine them.

"and best practices for maintaining visibility without overcomplicating configs"

Every rule should have logging configured unless there is a specific reason not to log.  If you create a Log Forwarding profile named "default", it will be automatically added to a new rule.  The Day 1 Configuration has this group.

Every allow rule should have a security profile configured.  If you create a Security Profile Group named "default", it will be automatically added to a new rule.  The Day 1 Configuration has this group.

When you configure a new NGFW, start with the Day 1 Configuration.  You will find it on the CSP portal under Products > Assets with the icons.

Run a BPA on your NGFW for additional recommendations.  I generally agree with 1/2 of the recommendations.  Know your own security policy, and which ones make sense to you.  Instructions for the BPA can be found on the Best Practices page.

 

Once you have built new habits, they are easier to maintain.

 

Thanks,

 

Tom

 

Edit:  @kiwi 's comments to your other post are great!  I added a few there also.  https://live.paloaltonetworks.com/t5/general-topics/beginner-question-best-way-to-structure-policy-d...

 

Help the community: Like helpful comments and mark solutions.

Cyber Elite

Hi @hellencharless54 ,

 

"recommended learning paths"

https://learn.paloaltonetworks.com/learn/learning-plans/350/certified-next-generation-firewall-ngfw-...

It's free!

 

Thanks,

 

Tom

 

Help the community: Like helpful comments and mark solutions.
  • 768 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!