{"id":193,"date":"2011-08-29T10:11:00","date_gmt":"2011-08-29T10:11:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/08\/29\/control-13-limitation-and-control-of-network-ports-protocols-and-services\/"},"modified":"2011-08-29T10:11:00","modified_gmt":"2011-08-29T10:11:00","slug":"control-13-limitation-and-control-of-network-ports-protocols-and-services","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/control-13-limitation-and-control-of-network-ports-protocols-and-services\/","title":{"rendered":"Control 13: Limitation and Control of Network Ports, Protocols, and Services"},"content":{"rendered":"
Just as mentioned in Control 5 Boundary Defense<\/a>, proper ingress and egress filtering should be in place. Diligently maintaining awareness of the traffic that is allowed into and out of your network is critical. <\/p>\n SourceFire<\/a> RNA<\/a> Compliance Rules allow the administrator to create rules that mirror the firewall rules and alert when any other traffic occurs. This is configured in the administrative console at Policy & Response, Compliance, Rule Management, Create or open a Group. Select If a flow event occurs and meets the following conditions. Add a condition such as if Payload is AOL Mail. This feature in RNA allows the user to define approved flows and respond to everything not specifically allowed. Policy violations and new traffic flows will become immediately apparent and will be complimentary to the traditional network firewall rules.<\/p>\n Perform daily network discovery scans using nmap<\/a>. Depending on the complexity of the network, multiple scanners may need to be deployed to ensure complete coverage. List the name of each service running on the network and attempt to justify its business need. Consider an nmap diff scan<\/a> to identify all hosts and their associated services. Using the diff option, results for the new scan are compared to the previous one, with only the changes being noted.<\/p>\n","protected":false},"excerpt":{"rendered":" Just as mentioned in Control 5 Boundary Defense, proper ingress and egress filtering should be in place. Diligently maintaining awareness of the traffic that is allowed into and out of your network is critical. SourceFire RNA Compliance Rules allow the administrator to create rules that mirror the firewall rules and alert when any other traffic […]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[20,21,22],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\n