WikiFrameworksCyberSecure CanadaDevice Software Firewalls

Device Software Firewalls

Updated: 2026-02-25

Plain English Translation

To protect endpoints against unauthorized access, organizations are required to enable built-in software firewalls, such as Windows Defender Firewall or macOS Application Firewall, on all network devices. This host-based firewall acts as a critical line of defense for remote and on-premise hardware. If an organization chooses not to use device software firewalls, they must formally document the alternative technical controls in place that provide equivalent security.

Executive Takeaway

Activating built-in software firewalls on all corporate devices prevents unauthorized network traffic from compromising endpoints.

ImpactMedium
ComplexityLow

Why This Matters

  • Mitigates lateral movement of threats within corporate networks if a single device is compromised.
  • Ensures remote workers have a baseline of perimeter protection when operating on untrusted public networks.

What “Good” Looks Like

  • Host-based firewalls are centrally enforced via MDM or group policy to prevent users from disabling them, and tools like WatchDog Security's Compliance Center can help track enforcement evidence and recurring checks.
  • Any exceptions or alternative measures, such as relying strictly on cloud security groups for servers, are formally documented.

A device software firewall is a host-based security feature included natively on devices, such as Windows Defender Firewall or macOS Application Firewall. CyberSecure Canada Section 5.7.3.3 requires these to be active on all network devices, or for alternative measures to be formally documented.

Organizations can prove compliance by exporting configuration reports from their Mobile Device Management (MDM) solution or endpoint management tools. Providing screenshots of active firewall policies distributed to a sample of endpoints is also valid evidence.

Yes, enabling the native Windows Defender Firewall satisfies the device software firewall requirement for Windows endpoints. Organizations must ensure it is centrally enforced so standard users cannot easily disable it.

Organizations should configure their MDM platform to deploy a mandatory configuration profile that enables the host-based firewall. The MDM can prevent standard users from modifying these settings and provide compliance reporting for offline or remote endpoints.

Organizations should collect centralized policy configuration screenshots, MDM compliance reports showing the percentage of compliant devices, and documented exceptions. This proves that the endpoint firewall policy is active, enforced, and monitored. Tools like WatchDog Security's Compliance Center can help link these artifacts to the control and maintain an audit-ready evidence trail over time.

Exceptions should be documented in the organization's internal hardening standards or firewall configuration records. This documentation must include a business justification, the specific ports or protocols allowed, and the duration of the exception.

Yes, if an organization uses an Endpoint Detection and Response (EDR) or third-party endpoint protection platform that manages or overrides the native firewall, this qualifies. The organization must document this alternative measure to satisfy CyberSecure Canada requirements.

Yes, the standard applies to devices within the network, including servers and VMs. If an organization relies solely on cloud security groups or perimeter network firewalls to protect servers, they must formally document this as an alternative measure in place instead of the software firewall.

Organizations should review firewall configurations and rule sets at least annually. Regular reviews ensure that legacy rules are removed and the endpoint firewall policy remains aligned with current business and security needs.

Organizations must either enforce host-based firewalls on BYOD devices via MDM or require contractors to attest to active firewalls before granting network access. Alternatively, segmenting these devices onto a separate guest network away from corporate assets can serve as a documented alternative measure.

A key challenge is proving, over time, that host-based firewalls are enabled across all endpoints and that exceptions are reviewed. Tools like WatchDog Security's Compliance Center can map this requirement to evidence requests, schedule recurring attestations, and centralize MDM or endpoint reports so audit evidence is consistent and easy to retrieve.

Firewall exceptions can become risky when business justifications, scope, and expiry dates are not tracked. Tools like WatchDog Security's Risk Register can record each exception as a risk with an owner, treatment plan, and review cadence, helping teams document approvals, monitor compensating controls, and demonstrate ongoing oversight during audits.

CYBERSECURE-CANADA Section 5.7.3.3

"The organization shall activate any software firewalls included on devices within their networks or document the alternative measures in place instead of these firewalls."

VersionDateAuthorDescription
1.0.02026-02-25WatchDog Security GRC TeamInitial publication