: Getting Started with Best Practices
Table of Contents

Getting Started with Best Practices

Security best practices give visibility into traffic, reduce the attack surface, prevent threats, protect networks, and activate Security Assurance.
Security best practices prevent known and unknown threats, reduce the attack surface, and provide visibility into traffic, so you know and control which applications, users, and content are on your network. When you implement security best practices, you:
  • Minimize the chances of a successful intrusion.
  • Identify the presence of attackers.
  • Protect your valuable data.
  • Protect your customers, partners, and employees, and thus protect the reputation of your business.
  • Help to achieve a Zero Trust security environment.
To transition to security best practices, first you need to understand your current network security posture. Understanding your current security posture enables you to identify areas for improvement. Palo Alto Networks provides a guided transition path: Strata Cloud Manager's Best Practice Assessment (BPA) and Best Practices Dashboard, combined with Safe Transition Steps and best practice technical documentation. Use the BPA and the Best Practices Dashboard to understand the current state of your network security and recommendations for improvement, then use safe transition steps and technical documentation to implement improvements.
When you subscribe to the Platinum Support Contract, you have the opportunity to use Security Assurance. Security Assurance provides access to Palo Alto Networks security experts and tools to help with initial incident investigation.
The Palo Alto Networks Best Practices Portal provides specific planning, deployment, and maintenance best practices steps for a variety of features and security goals, including:
Other books available on the Best Practices portal include Decryption, DoS and Zone Protection, Panorama, IoT, internet gateway, and more.

Recommended For You