Data Center Security Policy Best Practices Checklist

If you’re already familiar with Palo Alto Networks’ platform, this checklist streamlines planning for and deploying security best practices in your data center.
Your enterprise’s most valuable assets reside in your data center, including proprietary source code, intellectual property, and sensitive company and customer data. Your customers and employees trust you to maintain the confidentiality and integrity of their data and expect that data to be always available, so it’s important to implement a data center best practice security policy that safeguards your data and prevents successful attacks. It’s not enough to harden the network perimeter because attacks can originate from inside the network, attacks can come from partners and contractors whose credentials have been compromised, and because if an attacker gains a foothold in your network, the attacker can attack from the inside of the network by moving laterally from device to device.
If you are familiar with Palo Alto Networks platform, you can save time by using this streamlined checklist to implement pre-deployment, deployment, and post-deployment data center security policy best practices. Each section includes links to detailed information in the full Data Center Best Practice Security Policy document or in the PAN-OS 8.1 Admin Guide, including how to configure policy rules and security profiles.

Related Documentation