Starting Best Practices with the BPA and Security Assurance

Table of Contents
Filter icon
Expand all | Collapse all

Apply security best practices to reduce the attack surface, gain visibility into traffic, prevent threats, and protect your network, users, and data.  

Featured Topics

Prevention Architecture Methodology

Documents, checklists, videos, webinars, best practice assessment tools, and more help you learn about and apply security best practices.

Book Image

Best Practices Assessment (BPA)

Decryption Best Practices

You can't protect yourself against what you can't see. Decrypt as much traffic as local regulations and your business requirements allow so that you can inspect the traffic and block malicious content and actions.

Recommended Topics

Data Center Best Practices

Use the guidelines in this best practice to plan, deploy, and maintain your data center best practice security policy.

Administrative Access Best Practices

Firewall administrators control how your firewalls behave. Ensure that their access follows the principle of least privilege access and that administrative access methods are secure.

Internet Gateway Best Practices

One of the cheapest and easiest ways for an attacker to gain access to your network is through users accessing the internet. Use the guidelines in this site to plan, deploy, and maintain your internet gateway best practice security policy.


Best Practice Assessment Plus (BPA+) Tool Demo

View the BPA+ demo, which shows you how to check your PAN-OS best practice configuration and update it if necessary.

BPA+ YouTube Channel

Click "View BPA+ Playlist" to access all of the BPA+ videos, including best practice network security checks and a demo.

Decrypt Your Network Traffic

Decrypt traffic so that you can inspect it and protect your network from malicious traffic.

Introduction to the Best Practice Assessment Plus (BPA+) Tool

Learn about how to check and improve your best practice network security posture using the BPA+.

What Is Zero Trust?

John Kindervag talks about what Zero Trust means.