Focus

Data Center Best Practice Security Policy


Table of Contents
Filter icon
Filter
10.0 (EoL)
Expand all | Collapse all
End-of-Life (EoL)

Your enterprise's most valuable assets reside in your data center, including proprietary source code, intellectual property, and sensitive company and customer data. Your customers and employees trust you to maintain the confidentiality and integrity of their data and expect that data to be always available, so it's important to implement a data center best practice security policy that safeguards your data and prevents successful attacks. Use the guidelines in this site to plan, deploy, and maintain your data center best practice security policy. 

Featured Updates

New Features Simplify Decryption


Updated with recommendations for using the new decryption features introduced in PAN-OS 10.0, including TLS 1.3 support and enhancements for simplifying troubleshooting of decryption issues.

                                                             

Block QUIC Traffic


Our recommended block rules have been updated with recommendations for blocking the Quick UDP Internet Connections (QUIC) protocol to prevent potentially dangerous encrypted traffic from entering the network.

Featured Topics

Book Image

SSL Decryption Exposes Encrypted Malware

Book Image

Data Center Security

Hybrid Data Center BPA Planner

Recommended Topics

What Is a Data Center Best Practice Security Policy?


Protect all north-south and east-west traffic flows and prevent attackers from getting into your data center and executing malware or exfiltrating data.

Why Do I Need a Data Center Best Practice Security Policy?


Ensure the availability, confidentiality, and integrity of your network and valuable assets from external and internal attacks.

How Do I Deploy a Data Center Best Practice Security Policy


Learn how to create and implement a best practice data center security policy that protects your most valuable assets.

Related Information

Book Image

Enabling and Deploying Your SSL Decryption Webinar

Videos

Antivirus Profile Decoder Actions Best Practice Settings Check

Ensure that your Antivirus profile configuration follows network security best practices for decoder actions.

DNS Sinkhole Best Practice Settings Check

Ensure that your DNS Sinkhole configuration follows network security best practices.

Antivirus Profile WildFire Decoder Actions Best Practice Settings Check

Ensure that your Antivirus profile configuration follows network security best practices for WildFire decoder actions.

Interzone Deny Rule Logging Best Practice Settings Check

Ensure that you modify the default interzone deny rule to enable logging and follow network security best practices.

BPA+ YouTube Channel


Click "View BPA+ Playlist" to access all of the BPA+ videos, including best practice network security checks and a demo.

Intrazone Allow Rule Logging Best Practice Settings Check

Ensure that you modify the default intrazone allow rule to enable logging and follow network security best practices.