One of the cheapest and easiest ways for an attacker
to gain access to your network is through users accessing the internet.
By successfully exploiting an endpoint, an attacker can take hold
in your network and begin to move laterally towards the end goal,
whether that is to steal your source code, exfiltrate your customer
data, or take down your infrastructure. To protect your network
from cyberattack and improve your overall security posture, implement
a best practice internet gateway security policy. A best practice
policy allows you to safely enable applications, users, and content
by classifying all traffic, across all ports, all the time.
The following topics describe the overall process for deploying
a best practice internet gateway security policy and provide detailed
instructions for creating it.