A best practice security policy allows you to enable applications safely by classifying all
traffic, across all ports, all the time, including encrypted traffic. Determine the
business use case for each application to create Security policy rules that allow and
protect access to relevant applications. A best practice security policy leverages the
next-generation technologies—App-ID, Content-ID, User-ID, and Device-ID (for
IoT Security, which is beyond the scope of this book)—on the
Palo Alto Networks enterprise security platform and: