Fortinet Recommended Security Best Practices v1.2
Fortinet Recommended Security Best Practices v1.2
Version history
April 2017: V1.0
• Initial security checks available with FortiOS 5.6.0.
The Security Rating feature provides a method to continually take a pulse of the current security posture, compare against
industry peers, and assess the effectiveness in managing security risks to critical networks and enterprise assets.
Based on Security Best Practices and Standards, the capabilities of the Security Fabric can be further leveraged through the
Security Rating feature. This feature provides a mechanism to continually assess the Security Fabric, validate that configurations
are working effectively, and provide awareness of risks and vulnerabilities which may impact daily business operations.
The diagram below shows the security rating reporting process flow. The Security Rating checks are performed on the Security
Fabric enabled network and provide scoring and recommendations to operations teams. The Score Card can be used to gauge
adherence to various internal and external organizational policy, standards and regulation requirements and ranking against
industry peers through the FortiGuard Security Rating Service.
Using this integrated security controls framework, customers can tailor security checks to suit their unique security, risk and
compliance goals.
The following security category checks are currently available as of the release of FortiOS 6.0.0. Additional security checks and
associated recommendation will be added with future FortiOS releases.
FSBP ID (FORTINET
SECURITY SECURITY CONTROL TESTING PROCEDURES GUIDANCE
BEST PRACTICES)
For any firewalls in the Security Fabric which are not
running a compatible version of firmware with the
From the Security Fabric root, verify that all Security Fabric root, upgrade them to a version of
firewalls in the Security Fabric are running a firmware that is compatible with the Security Fabric
version of firmware that is compatible with the root.
Security Fabric root.
Compatible Firmware. Ensure that the latest
FS01 compatible software and firmware is installed on For any access layer devices in the Security Fabric
all members of the Security Fabric. From the Security Fabric root, verify that all which are not running the recommended version
access layer devices (Wireless & Switch) of firmware, upgrade them to the recommended
are running a version of firmware that is version of firmware.
recommended for the firewall that they are
managed by.
Use the published Security Fabric document to
validate compatible firmware versions.
From the Security Fabric root, verify that every
firewall in the Security Fabric has a valid support
contract and is registered with the vendor. If any firewalls in the Security Fabric don’t have
Vendor Support. Ensure a current support
a valid support/subscription contract or aren’t
contract with the vendor is in place to obtain
FS02 registered with the vendor, then contact the vendor
the latest security notifications, updates and From the Security Fabric root, verify that support center to renew/update the support and
configuration management best practices. every firewall in the Security Fabric has a valid subscriptions contracts.
subscription to receive anti-malware and threat
security check updates.
Unauthorized access layer From the Security Fabric root, Review the unauthorized access layer devices to determine if they should
devices. verify that every access layer join the Security Fabric, and if so, authorize them from the Security Fabric
All access layer devices such as device detected behind a firewall root. For any unauthorized access layer devices which should not be part
ND01 wireless access points and network in the Security Fabric is authorized of the Security Fabric, explicitly disable them so that no communication
switches should be identified and to communicate with the firewall, takes place. Continue to log and monitor for unauthorized communication
validated. Unauthorized devices or explicitly disabled from doing to the Security Fabric. Periodically review the logs for persistent traffic from
should be immediately disabled. so. unauthorized devices.
From the Security Fabric root, End user devices should be separated from internal servers by placing them
Segregation of Traffic. verify that every firewall in the in a different segment from the server. Firewall interfaces should be labeled
ND04 Separate servers from end user Security Fabric has no servers with a Security Profile and business purpose description. Publicly accessible
devices. detected in a segment that also servers should be placed behind an interface which is classified as “DMZ” to
contains end user devices. limit the inbound traffic to only those authorized servers.
Interface Classification.
From the Security Fabric root, All interfaces should be defined according to the security profile desired for
All network interfaces should be
verify that for every firewall in the protection of the systems placed behind them, and labeled according
assigned a defined and configured
ND08 the Security Fabric, all network to the business function those systems serve. For each interface on each
based on the security risk profile of
interfaces are classified as either firewall in the fabric, assign the appropriate security profile (“WAN”, “LAN” or
the segments and systems being
“WAN”, “LAN”, or “DMZ”. “DMZ”) and label its business function using the Alias description.
protected.
Administrator Password Policy. From the Security Fabric root, Enable a strong password policy for firewall administrators. Align the policy
A strong password policy including verify that every firewall in the and its management with the established corporate security policy for critical
SH05 upper, lower alphanumeric characters Security Fabric has a strong systems. This should include limiting administrator access to high trust
and at least eight characters in length password policy in place for individuals, enforcing unique username and passwords and safekeeping of
should be in place. administrators. backup/recovery administrator accounts.
Maintain business justification for use of all services, protocols, and ports
Potentially Insecure Policies.
allowed, including documentation of security features implemented for
Firewall policies should permit only the Future Release
SH06 those protocols considered to be insecure. Examples of insecure services,
least required traffic specific for the Implementation
protocols, or ports include but are not limited to FTP, Telnet, POP3, IMAP,
business function purposes.
and SNMP.
Illogical Policies. Firewall policies Review firewall and router rule sets at least every six months. Restrict
should permit only specific limited Future Release inbound and outbound traffic to only that which is necessary for legitimate
SH07
traffic for the business function Implementation business applications. Develop specific source and destination based firewall
purposes. policies. Define valid hosts or groups as source and destinations.
Future Release Network anomalies indicting malware traffic should be identified and
TV03 Network Anti-Virus.
Implementation prevented from further progress into critical segments.
Web Ap
plica
tion
Sec
uri
ty
WS03
AL01
AL02
02
WS
AL0
3
01
AL
WS
04
08
AS
TV
01 Level 0 Level 5 07
Informal & Ad-hoc TV
Lack of any basic network Increased automation of SOC 06
boundary protection. TV
user and data access aligned with
AS 05
02
Privacy requirements. TV
4
T V0
3
T V0
CIS #20
9
AS03 T V02
CIS #1
16
CIS #
#13
12
T V01
CIS
S#
9
S#
CI
CI #6
CIS SH16
CIS #6 SH15
#7 CIS
SH14
Level 4
Level 1 Managed & Monitored
SH13
CIS #8 CIS #18
Continuously monitor and adapt SH12
Protect the network against SH11
common external threats. CIS meet security compliance
#12 #19 SH10
CIS requirements.
CI SH09
#1 CI S #1
DP01 CI
S S# 9
16 SH08
CI #1
2
S#
S# 4
CI #13
SH07
#6
S
CIS #9
CI
15
CIS
10
CIS
CIS
CIS #11
SH06
CIS #4
CIS #3
CIS #
#5
SH05
SH0
4
SH0
3
SH0
SH 2
01
ND
1
Level 3 ND 4
Level 2 ND 13
Developing & Manual ND 12
Increased awareness of network
01 Asset Awareness and
activity. Ability to recover ND 11
EM Device Lockdown.
from a cyber attack. ND 10
09
En
y
ND 07
lic
08
dp
ND 06
Po
ND 5
oi
tM
an
d
ND 4
n
02
an
ND
n
0
EM
ig
ND
ag
0
es
ND
03
em
ND0
D
02
en or k
FS01
FS02
t tw
Ne
Firmw
are and Subscriptions
Level 1
• Perimeter Network Defenses
Level 2
• Network devices and asset inventory.
• Acceptable software and systems.
• Harden network devices.
Level 3
• Privileged User local/remote access management.
• Physical access management.
• Access logging and monitoring.
• Backup and recovery.
• Configuration compliance checking - network.
• Compliance with internal security policies.
Level 4
• Vulnerability and threat risk scoring.
• Asset vulnerability scanning integration.
• Advanced/Active Threat Protection with external security feeds.
• Industry best practices and feature updates.
• Stronger user/client identity and access management (privileged users).
• Automated log analysis with customised application threat use cases.
• Security Awareness Reporting.
• Formal Security Operations.
• Formal Incident Response and Recovery.
• Post-Incident Analysis Reporting and Recommendations.
• Compliance Monitoring and Compliance Risk Assessment Reporting.
• Compliance with external regulatory Security requirements.
Level 5
• User behavior tracking.
• Application/data visibility and control.
• Stronger user/client identity and access management (all users).
• Data forensics analysis.
• Trend and historical Key Risk Monitoring.
• Automated threat/anomaly detection to remediation action.
• Compliance with external regulatory Privacy requirements.
Level 2
CIS #1 Inventory of Authorized and Unauthorized Devices.
CIS #2 Inventory of Authorized and Unauthorized Software.
CIS #6 Maintenance, Monitoring, and Analysis of Audit Logs – Firewall alerts.
CIS #10 Data Recovery Capability.
CIS #11 Secure Configuration for Network Devices.
Level 3
CIS #3 Secure Configurations for Hardware and Software.
CIS #4 Continuous Vulnerability Assessment and Remediation.
CIS #5 Controlled Use of Administrative Privileges.
CIS #9 Limitation and Control of Network Ports.
CIS #13 Data Protection.
CIS #14 Controlled Access Based on the Need to Know.
CIS #15 Wireless Access Control.
CIS #16 Account Monitoring and Control.
CIS #19 Incident Response and Management – Firewall/Malware software driven alerts.
Level 4
CIS #6 Maintenance, Monitoring, and Analysis of Audit Logs – System, Applications all network devices.
CIS #18 Application Software Security.
CIS #19 Incident Response and Management – Common threat and compliance use case driven. Multi-source log consolidation and normalization.
Level 5
CIS #6 Maintenance, Monitoring, and Analysis of Audit Logs – Internal threat and data ex-filtration use case driven behavior analysis.
CIS #9 Limitation and Control of Network Ports – Internal WAF.
CIS #12 Boundary Defense – Back-channel and covert channel detection.
CIS #13 Data Protection – Continuous monitoring of all clear text confidential data and PII data.
CIS #16 Account Monitoring and Control – Privileged user profiling. PII data access profiling.
CIS #19 Incident Response and Management – Integration with upstream ticket/change management systems.
CIS #20 Penetration Tests and Red Team Exercises.
Application Security
AS01 Application database configuration.
AS02 Application Policy.
AS03 SSL/SSH Deep Inspection.
Data Protection
DP01 Data Loss Prevention.
Endpoint Management
EM01 Endpoint Registration and Vulnerabilities. The fabric should be aware of any endpoints that may be affected with malicious software.
EM02 Endpoint Compliance. Endpoints should be verified for conformance to corporate network security and acceptable use policies. Endpoints should not be
permitted to access critical network resources until compliance has been verified.