Sophos Firewall Hardening Best Practices Guide
Sophos Firewall Hardening Best Practices Guide
Hardening Best-Practices
This guide covers best-practices for hardening your Sophos Firewall but
should also be applied to all your network infrastructure from Sophos or
any other vendor.
Sophos Firewall Hardening Best-Practices
You can easily schedule updates in Sophos Central to be applied during a period of minimal disruption.
If you don’t have one already, consider a High-Availability (HA) deployment which has the benefit of being
able to upgrade device firmware without disruption.
Keep up to date on the latest firmware updates and news on the Sophos Firewall Community.
Online Guides:
Ì Firmware
Ì High Availability
Check your local services access control under Administration > Device Access and ensure no items are
checked for the WAN Zone unless absolutely necessary. Also be sure to lock down admin access from your
internal LAN as well by ensuring admin interfaces are either disabled or only accessible from specific trusted
LAN IPs.
For remote users, consider ZTNA which is much more secure than VPN, however if using VPN, utilize the
new hardened containerized VPN Portal and only enable it when configurations change and users need to
update – otherwise keep it disabled. Disable User Portal access on the WAN and provide access via VPN
only. Use multi-factor authentication on all portals (see below).
Online Guides:
Ì Access Control
2
Sophos Firewall Hardening Best-Practices
Online Guides:
Audit and review all your NAT and Firewall Rules regularly to ensure there are no WAN to LAN or remote
access enabled. Conduct regular tests and audits of firewall rules to spot risky configuration drift, paying
particularly focus on services exposed to the WAN side of the device.
Use ZTNA (or even VPN) for remote administration and access to internal systems – DO NOT expose these
systems, especially Remote Desktop access to the Internet. For IoT devices, shut down any devices that
do not offer a cloud proxy service and require direct access via NAT - these devices are ideal targets for
attackers.
Online Guides:
Ì NAT Rules
Also protect your network from both DoS and DDoS attacks by setting and enabling protection under
Intrusion Prevention > DoS & spoof protection. Enable spoof prevention and apply flags for all DoS attack
types.
Block traffic from regions you don’t do business with by setting up a firewall rule to block traffic originating
from unwanted countries or regions.
Ensure Sophos X-Ops threat feeds are enabled to log and drop under Active Threat Protection.
Use Network Detection and Response (NDR) to monitor traffic to/from the firewall as well as traffic flowing
through the firewall for possible attacks.
Online Guides:
Ì Offloading Applications
Ì Country Blocking
3
Sophos Firewall Hardening Best-Practices
Also ensure your firewalls are sending logs to Sophos Central and/or your SIEM of choice.
Online Guides:
Ì Notifications
Ì Log Settings
4
Sophos Firewall Hardening Best-Practices
United Kingdom and Worldwide Sales North American Sales Australia and New Zealand Sales Asia Sales
Tel: +44 (0)8447 671131 Toll Free: 1-866-866-2802 Tel: +61 2 9409 9100 Tel: +65 62244168
Email: [email protected] Email: [email protected] Email: [email protected] Email: [email protected]
2024-10-30 EN (PC)