Data Center Best Practice Security Policy
Learn about Palo Alto Networks data center security policy best practices to protect your most valuable assets.
Your enterprise’s most valuable assets reside in your data center, including proprietary source code, intellectual property, and sensitive company and customer data. Your customers and employees trust you to maintain the confidentiality of their sensitive data and expect your data center to be always available because they expect their data to be always available. It’s important for the integrity and success of your business to implement a data center best practice security policy that safeguards your data and prevents successful attacks.
The following methods and recommendations provide a blueprint for planning, designing, and implementing a data center best practice security policy in a phased, prioritized manner. Creating a data center best practice security policy may be a daunting task if you try to implement every protection on every area of your network at one time. However, if you evaluate what is most important to protect and begin implementing your data center best practice security policy by defending your most valuable assets first, you can transition gradually to a security policy that allows you to safely enable applications, users, and content without taking undue risks.
The Data Center Security Policy Best Practices Checklist provides an overview of pre-deployment, deployment, and post-deployment best practices, and a way to implement best practices more quickly if you don’t need detailed explanations.
- What Is a Data Center Best Practice Security Policy?
- Why Do I Need a Data Center Best Practice Security Policy?
- Data Center Best Practice Methodology
- How Do I Deploy a Data Center Best Practice Security Policy?
- How to Assess Your Data Center
- How to Decrypt Data Center Traffic
- Create a Data Center Segmentation Strategy
- How to Create Data Center Best Practice Security Profiles
- Use Traps to Protect Data Center Endpoints
- Create Data Center Traffic Block Rules
- Define the Initial User-to-Data-Center Traffic Security Policy
- Define the Initial Internet-to-Data-Center Traffic Security Policy
- Define the Initial Data-Center-to-Internet Traffic Security Policy
- Define the Initial Intra-Data-Center Traffic Security Policy
- Order the Data Center Security Policy Rulebase
- Log and Monitor Data Center Traffic
- Maintain the Data Center Best Practice Rulebase
- Use Palo Alto Networks Assessment and Review Tools
How Do I Deploy a Data Center Best Practice Security Policy
Learn how to create and implement a best practice data center security policy that protects your most valuable assets. ...
Data Center Security Policy Best Practices Checklist
If you’re already familiar with Palo Alto Networks’ platform, this checklist streamlines planning for and deploying security best practices in your data center. ...
Plan Your Data Center Best Practice Deployment
If you’re already familiar with Palo Alto Networks’ platform, this checklist streamlines planning your data center best practice deployment strategy and roll-out so that you ...
Define the Initial User-to-Data-Center Traffic Security Pol...
Define who can use which data center applications on which servers and other devices. ...
How to Assess Your Data Center
Discover, list, and evaluate your data center assets to understand which assets to protect first and who should have access to those assets. ...
Define the Initial Internet-to-Data-Center Traffic Security...
Define the external application traffic from vendors, customers, partners, etc., that can access your data center from the internet. ...
Monitor Data Center Block Rules and Tune the Rulebase
Monitor traffic that you explicitly block so that you can investigate potential attacks and evaluate whether you should allow any of the blocked traffic. ...
Data-Center-to-Internet Traffic Security Approaches
Learn the risks of the traditional approach to securing data center server traffic to internet servers (for updates, certificate revocation checks, etc.) and how the ...
Create Internet-to-Data-Center Decryption Policy Rules
Create rules that decrypt partner, vendor, customer, and other third-party traffic from the internet to the data center so you can inspect the traffic and ...