Best Practice Internet Gateway Security Policy
One of the cheapest and easiest ways for an attacker to gain access to your network is through
users accessing the internet. By successfully exploiting an endpoint, an attacker can
enter your network and move laterally towards the end goal: stealing source code,
exfiltrating customer data, or taking down infrastructure. To protect your network from
cyberattacks and improve your overall security posture, implement a best practice
internet gateway security policy. A best practice policy allows you to safely enable
applications, users, and content by controlling all traffic, across all ports, all the
time.
Refer to the Palo Alto Networks series of
best practices books, which include planning, deployment,
and maintenance best practices advice on subjects such as: