Infrastructure Security · IS-Q17B

Bonus Question: Are network perimeter defenses (firewalls, proxies, WAFs) layered and centrally managed?

Why This Matters

Layered perimeter controls reduce exposure to attacks and provide unified visibility. Centralized management ensures policy consistency and faster response to threats.

Maturity

0 — Unaware
No defined perimeter or control layering.
1 — Ad Hoc
Independent firewall devices without standard rules.
2 — Defined
Multiple perimeter controls (FW, WAF, proxy) documented.
3 — Managed
Central management and rule synchronization implemented.
4 — Integrated
SIEM and SOC monitoring established across all layers.
5 — Optimized
Adaptive perimeter controls with automated threat feed updates.

How to Level Up

| From → To | Actions | |—|—| | 0 → 1 |Identify all perimeter devices and configurations.| | 1 → 2 |Document control layers and coverage.| | 2 → 3 |Implement centralized management console.| | 3 → 4 |Integrate logs with SIEM and SOC dashboards.| | 4 → 5 |Automate rule updates and dynamic blocking feeds.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

| Purpose | Tool | Notes | |—|—|—| | WAF | ModSecurity | Reverse-proxy protection | | Proxy | Squid | Access logging | | SIEM | Wazuh / ELK | Unified monitoring |

Common Pitfalls

Compliance Mapping

| Standard | Clauses / Notes | |—|—| | ISO/IEC 27001 | A.8.23 | | CERT-In 2022 | Section 16 | | NIST CSF 2.0 | PR.PT / DE.CM | | NIRMATA Mapping | IS-Q17B strengthens layered perimeter control under Infrastructure Security. |