Starting Best Practices with the BPA and Security Assurance
Apply security best practices to reduce the attack surface, gain visibility into traffic, prevent threats, and protect your network, users, and data.
Prevention Architecture Methodology
Documents, checklists, videos, webinars, best practice assessment tools, and more help you learn about and apply security best practices.
Decryption Best Practices
You can't protect yourself against what you can't see. Decrypt as much traffic as local regulations and your business requirements allow so that you can inspect the traffic and block malicious content and actions.
Administrative Access Best Practices
Firewall administrators control how your firewalls behave. Ensure that their access follows the principle of least privilege access and that administrative access methods are secure.