Starting Best Practices with the BPA and Security Assurance
Apply security best practices to reduce the attack surface, gain visibility into traffic, prevent threats, and protect your network, users, and data.
Featured Topics
Prevention Architecture Methodology
Documents, checklists, videos, webinars, best practice assessment tools, and more help you learn about and apply security best practices.
Decryption Best Practices
You can't protect yourself against what you can't see. Decrypt as much traffic as local regulations and your business requirements allow so that you can inspect the traffic and block malicious content and actions.
Recommended Topics
Data Center Best Practices
Use the guidelines in this best practice to plan, deploy, and maintain your data center best practice security policy.
Administrative Access Best Practices
Firewall administrators control how your firewalls behave. Ensure that their access follows the principle of least privilege access and that administrative access methods are secure.
Internet Gateway Best Practices
One of the cheapest and easiest ways for an attacker to gain access to your network is through users accessing the internet. Use the guidelines in this site to plan, deploy, and maintain your internet gateway best practice security policy.
Videos
Best Practice Assessment Plus (BPA+) Tool Demo
BPA+ YouTube Channel
Click "View BPA+ Playlist" to access all of the BPA+ videos, including best practice network security checks and a demo.