0% found this document useful (0 votes)
122 views

Sophos Firewall Hardening Best Practices Guide

Uploaded by

Елена О
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views

Sophos Firewall Hardening Best Practices Guide

Uploaded by

Елена О
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Sophos Firewall

Hardening Best-Practices
This guide covers best-practices for hardening your Sophos Firewall but
should also be applied to all your network infrastructure from Sophos or
any other vendor.
Sophos Firewall Hardening Best-Practices

Keep Firmware Up to Date


Every Sophos Firewall OS update includes important security enhancements. Ensure you keep your
firmware up to date under Backup & Firmware > Firmware. Check at least once a month for firmware
updates in Sophos Central or the on-box console. Deploy every update including all maintenance releases
(MRs) as every update may include important security fixes.

You can easily schedule updates in Sophos Central to be applied during a period of minimal disruption.

If you don’t have one already, consider a High-Availability (HA) deployment which has the benefit of being
able to upgrade device firmware without disruption.

Keep up to date on the latest firmware updates and news on the Sophos Firewall Community.

Online Guides:

Ì Firmware

Ì High Availability

Limit Device Service Access


It’s critically important that you disable non-essential services on the WAN interface which exposes them to
the Internet. In particular, HTTPS and SSH admin services. To manage your Firewall remotely, Sophos Central
offers a much more secure solution than enabling WAN admin access. Alternatively, use ZTNA for remote
management of your network devices.

Check your local services access control under Administration > Device Access and ensure no items are
checked for the WAN Zone unless absolutely necessary. Also be sure to lock down admin access from your
internal LAN as well by ensuring admin interfaces are either disabled or only accessible from specific trusted
LAN IPs.

For remote users, consider ZTNA which is much more secure than VPN, however if using VPN, utilize the
new hardened containerized VPN Portal and only enable it when configurations change and users need to
update – otherwise keep it disabled. Disable User Portal access on the WAN and provide access via VPN
only. Use multi-factor authentication on all portals (see below).

Online Guides:

Ì Access Control

Ì Sophos Central Management

Ì VPN and User Portals

2
Sophos Firewall Hardening Best-Practices

Use Strong Passwords, Multi-Factor Authentication, and Role-Based


Access
Enable Multi-Factor Authentication or One Time Password (OTP) and enforce strong passwords across
all admin and user accounts which will protect your Firewall from unauthorized access either from stolen
credentials or brute force hacking attempts. Ensure your sign-in security settings are set to block repeated
unsuccessful attempts and enforce strong passwords and CAPTCHA. Also use role-based access controls to
limit exposure.

Online Guides:

Ì Multi-factor Authentication (MFA)

Ì Admin and Sign-in Security Settings

Ì Device Role-Based Access

Ì VPN and User Portals

Minimize Access to Internal Systems


Any device exposed to the WAN via a NAT rule is a potential risk. Ideally, no device should be exposed to the
internet via NAT or inbound connections, including IoT devices.

Audit and review all your NAT and Firewall Rules regularly to ensure there are no WAN to LAN or remote
access enabled. Conduct regular tests and audits of firewall rules to spot risky configuration drift, paying
particularly focus on services exposed to the WAN side of the device.

Use ZTNA (or even VPN) for remote administration and access to internal systems – DO NOT expose these
systems, especially Remote Desktop access to the Internet. For IoT devices, shut down any devices that
do not offer a cloud proxy service and require direct access via NAT - these devices are ideal targets for
attackers.

Online Guides:

Ì NAT Rules

Enable Appropriate Protection


Protect your network from exploits by applying IPS inspection to incoming untrusted traffic via relevant
firewall rules. Ensure you don’t have any broad firewall rules that allow ANY to ANY connections.

Also protect your network from both DoS and DDoS attacks by setting and enabling protection under
Intrusion Prevention > DoS & spoof protection. Enable spoof prevention and apply flags for all DoS attack
types.

Block traffic from regions you don’t do business with by setting up a firewall rule to block traffic originating
from unwanted countries or regions.

Ensure Sophos X-Ops threat feeds are enabled to log and drop under Active Threat Protection.

Use Network Detection and Response (NDR) to monitor traffic to/from the firewall as well as traffic flowing
through the firewall for possible attacks.

Online Guides:

Ì IPS and DoS

Ì Offloading Applications

Ì Country Blocking

Ì Sophos X-Ops Threat Feeds

3
Sophos Firewall Hardening Best-Practices

Enable Alerts and Notifications


Sophos Firewall can be configured to alert administrators of system-generated events. Administrators
should review the list of events and check that system and security events are monitored to ensure that
issues and events can be acted upon promptly. Notifications are sent via either an email and/or to SNMPv3
traps. To configure Notifications, navigate to Configure > System services and select the Notifications list
tab.

Also ensure your firewalls are sending logs to Sophos Central and/or your SIEM of choice.

Online Guides:

Ì Notifications

Ì Log Settings

4
Sophos Firewall Hardening Best-Practices

United Kingdom and Worldwide Sales North American Sales Australia and New Zealand Sales Asia Sales
Tel: +44 (0)8447 671131 Toll Free: 1-866-866-2802 Tel: +61 2 9409 9100 Tel: +65 62244168
Email: [email protected] Email: [email protected] Email: [email protected] Email: [email protected]

© Copyright 2024. Sophos Ltd. All rights reserved.


Registered in England and Wales No. 2096520, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK
Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are
trademarks or registered trademarks of their respective owners.

2024-10-30 EN (PC)

You might also like