WikiArtifactsFirewall Configuration

Firewall Configuration

Technical Measure
Updated: 2026-02-21

A Firewall Configuration is a foundational technical measure that dictates how network traffic is permitted or denied across organizational boundaries, effectively functioning as the primary line of defense against unauthorized access. It defines access control lists, stateful inspection rules, port and protocol restrictions, and network address translation settings. For compliance purposes, this artifact matters because it provides definitive proof that the organization actively enforces network segmentation, restricts access using the principle of least privilege, and isolates sensitive environments like production from non-production zones. Auditors evaluate firewall configurations, alongside change management logs and periodic rule reviews, to verify that only authorized traffic flows into and out of the network, that insecure or deprecated ports are blocked, and that the implemented configuration aligns tightly with documented organizational security policies. WatchDog Security can support this by helping teams collect firewall exports, track reviews, and package evidence in Compliance Center for audit-ready reporting.

Sample Cloud Firewall Rule (AWS Security Group)

A JSON snippet demonstrating a least-privilege ingress rule that permits HTTPS traffic exclusively from a defined internal subnet, denying all other sources.

{
  "SecurityGroups": [
    {
      "Description": "Production Application SG",
      "GroupName": "prod-app-sg",
      "IpPermissions": [
        {
          "FromPort": 443,
          "IpProtocol": "tcp",
          "IpRanges": [
            {
              "CidrIp": "10.0.1.0/24",
              "Description": "Allow HTTPS from internal load balancer"
            }
          ],
          "ToPort": 443
        }
      ],
      "VpcId": "vpc-0123456789abcdef0"
    }
  ]
}

Command Line Examples

aws ec2 describe-security-groups

A firewall configuration baseline is a documented standard detailing the approved rules, ports, and protocols for your network boundaries. Auditors ask for it to verify that actual network settings match your approved security posture and that unauthorized changes are readily identified. WatchDog Security can help maintain the approved baseline as a controlled document in Policy Management and link the latest rule exports and review records in Compliance Center for consistent audit evidence.

Firewall configuration typically supports controls related to network security, secure management of network services, network segmentation, and configuration management. Together, these expectations require that network boundaries be intentionally managed, access be restricted to necessary traffic, and rule changes be governed through documented approvals and periodic review.

You should provide exports of current firewall rules (such as cloud security groups or physical firewall access lists), documentation from your periodic firewall rule reviews, and change management tickets demonstrating that all rule modifications were tested and approved before deployment. In WatchDog Security, Compliance Center can organize these exports and tickets against mapped controls and generate an exportable evidence package, while Secure File Sharing can be used to share the same artifacts with auditors using logged, time-limited access.

Compliance expectations typically require firewall rules to be reviewed on a defined cadence (commonly at least annually) and after significant network or application changes. This helps ensure outdated, overly permissive, or conflicting rules are identified and removed promptly. WatchDog Security can support smaller teams and larger enterprises by using Posture Management to continuously highlight risky rule patterns between formal reviews and by tracking review outcomes and exceptions in Compliance Center and the Risk Register.

Implement least privilege by strictly defining specific source IPs, destination IPs, and required ports rather than using broad permissive rules. You can start by monitoring traffic patterns and validating application dependencies before enforcing stricter blocks.

A robust firewall change management process includes a formal request detailing the business justification, a technical review for security impacts, documented management approval, testing in a non-production environment, a clear rollback plan, and an immutable audit trail of the implementation. WatchDog Security can help by storing change evidence and approvals as linked artifacts in Compliance Center, making it easier to demonstrate end-to-end governance during audits without changing your existing ticketing workflows.

Exceptions should be documented in a formalized risk register or exception tracker. The documentation must include a valid business justification, compensating controls applied, an assigned risk owner, and a specific expiration or review date to ensure the exception is not permanent. WatchDog Security supports this workflow with the Risk Register, including risk scoring, treatment plans, assigned owners, and review dates so exceptions remain time-bound and accountable.

Firewalls should centrally log denied traffic, administrative logins, and rule configuration changes. Retention periods vary by organization and risk, but a common baseline is retaining security logs for up to one year with a shorter window of readily searchable access to support investigations. WatchDog Security can help document and manage retention expectations in Policy Management and track evidence of log configuration and retention in Compliance Center, which is useful for startups and enterprises that need consistent, repeatable audit evidence.

Firewalls act as the technical enforcement mechanism for network segmentation by actively blocking unauthorized traffic between distinct zones. They help ensure that test or development environments cannot communicate with sensitive production systems unless explicitly required and approved, reducing the impact of a compromise.

Effectiveness is validated through regular internal and external vulnerability scanning, periodic penetration testing, automated configuration monitoring tools that detect baseline drift, and continuous log analysis to detect anomalies or bypass attempts. WatchDog Security can help by ingesting scan findings into Vulnerability Management for triage and MTTR analytics, while Posture Management can flag baseline drift in cloud network configurations so remediation stays measurable and auditable.

A GRC platform helps by centralizing firewall rule exports, review notes, and change approvals so evidence is easy to find and consistently formatted. In WatchDog Security, teams can map firewall configuration evidence to controls in Compliance Center and generate exportable evidence packages for audits. Secure File Sharing can also be used to share rule exports and review records with time-limited access and audit logging.

Automation typically combines continuous configuration checks with asset discovery so you can spot overly permissive rules, exposed ports, and drift from your baseline. WatchDog Security uses Posture Management to flag common misconfigurations via agentless checks and Asset Inventory to maintain an up-to-date view of cloud network assets and security groups. This makes it easier for startups, SMBs, and enterprises to standardize reviews without relying on manual snapshots.

VersionDateAuthorDescription
1.0.02026-02-21WatchDog Security GRC Wiki TeamInitial publication