: Data-Center-to-Internet Traffic Security Approaches
Focus
Focus

Data-Center-to-Internet Traffic Security Approaches

Table of Contents
End-of-Life (EoL)

Data-Center-to-Internet Traffic Security Approaches

Learn the risks of the traditional approach to securing data center server traffic to internet servers (for updates, certificate revocation checks, etc.) and how the best practice approach mitigates those risks.
The traditional legacy approach to securing data center traffic flowing to the internet leaves valuable assets exposed to risk, while the best practice approach protects your valuable assets.
The Traditional Approach
Risk
The Best Practice Approach
Create port-based rules and/or IP-based rules, which provide sufficient security in the trusted network.
Port-based and IP-based rules can’t control which applications to allow to connect to the internet. If a port is open, any application can use the port.
Create strict application-based allow rules that allow only data center servers that retrieve updates to use only legitimate applications to communicate only with legitimate update servers. Log and monitor allow rule violations.
When you transition from port-based to application-based rules, in the rulebase, place the application-based rule above the port-based rule it will replace. Reset the policy rule hit counter for both rules. If traffic hits the port-based rule, its policy rule hit count increases. Tune the application-based rule until no traffic hits the port-based rule for a period of time, then remove the port-based rule.
Data center servers only reach out to trusted servers such as update servers, so decrypting that traffic isn’t necessary.
Malware or command-and-control software that is already in the data center may attempt to communicate with external servers to download more malware or exfiltrate data.
Decrypt all traffic from the data center to the internet. Create a custom URL categories that defines the URLs data center servers are allowed to contact and use it in Security policy to limit internet access to external servers. Use the same custom URL in Decryption policy to decrypt traffic to those external servers.
Mix blocking and alerting threat prevention profiles from multiple vendors.
A conglomeration of individual tools leaves security holes for attackers and may not work together well.
The Palo Alto Networks suite of coordinated security tools works together to plug security holes and prevent attacks.

Recommended For You