Web Filtering Configuration
Web filtering configuration serves as a critical technical measure designed to monitor, restrict, and manage user access to external websites across an organization's network and endpoint devices. Its primary purpose is to drastically reduce exposure to malicious content, such as malware distribution sites, phishing domains, and unauthorized data exfiltration channels. This configuration typically encompasses a blend of DNS filtering rules, URL blocklists, secure web gateways, and endpoint security settings. For compliance purposes, this artifact must contain exported policy configurations, screenshots of active category blocks, and logs demonstrating that the filters are actively intercepting unauthorized access attempts. During an audit, an auditor will review these configuration settings and system logs to verify that the organization proactively enforces acceptable use policies and systematically protects internal assets from external web-based threats, ensuring that both remote and on-premises traffic remains continuously monitored and controlled.
Command Line Examples
aws network-firewall describe-firewall-policy --firewall-policy-arn arn:aws:network-firewall:region:account:firewall-policy/policy-nameWeb filtering restricts user access to external websites based on specific criteria to protect systems. DNS filtering blocks requests at the domain resolution level, while URL filtering inspects the full web address path for more granular control.
Common security control expectations require organizations to manage access to external websites to reduce exposure to malicious content. This typically involves implementing technical controls to filter, monitor, and block harmful domains and categories, while keeping evidence that controls are operating as intended.
Deploy DNS filtering, URL blocklists, secure web gateways, web proxies, or endpoint security tools that enforce access policies across your organization. Ensure the configuration is applied consistently to in-scope users and devices, and retain configuration exports and logs that demonstrate enforcement.
The policy should define acceptable use rules, specify categorically blocked sites like malware or phishing, outline the exception request process, and detail how filtering rules are technically enforced and periodically reviewed by management.
For strict security compliance, organizations must block known malware distributors, phishing sites, botnet command-and-control servers, illegal content repositories, and anonymizer services that bypass network security monitoring.
Exceptions must follow a documented approval workflow requiring clear business justification, managerial sign-off, a strictly defined expiration date, and periodic access reviews to ensure the temporary access is still necessary and justified.
While SSL/TLS inspection allows deeper visibility into encrypted traffic, it introduces significant privacy risks and performance overhead. DNS filtering and endpoint-level categorization serve as highly effective alternatives without breaking native encryption.
Enforce remote filtering using cloud-based secure web gateways, endpoint security agents installed directly on the device, or always-on VPNs that route external internet traffic through your web filtering infrastructure when appropriate.
Retain system block logs, threat prevention dashboard reports, configuration exports showing active blocked categories, and exception approval tickets. Auditors review these to verify the technical controls are actively functioning.
Conduct regular tests by attempting to access safe test resources such as EICAR or standardized blocking URLs, capturing screenshots of the resulting block pages, and verifying the associated alert generation in your centralized logging system.
Security and Privacy Controls for Information Systems and Organizations
National Institute of Standards and Technology
Guidelines on Firewalls and Firewall Policy
National Institute of Standards and Technology
Protective Domain Name Service (PDNS)
UK National Cyber Security Centre
Encrypted DNS Implementation Guidance
Cybersecurity and Infrastructure Security Agency
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-21 | WatchDog Security GRC Wiki Team | Initial publication |