4.4: Implement and Manage a Firewall on Servers
Threats Addressed:
Incorporates the following controls from the previous version: 9.2: Ensure Only Approved Ports, Protocols, and Services Are Running, 9.4: Apply Host-Based Firewalls or Port-Filtering, 11.2: Document Traffic Configuration Rules, 12.4: Deny Communication Over Unauthorized Ports.
Control Statement
Implement and manage a firewall on servers, where supported. Example implementations include a virtual firewall, operating system firewall, or a third-party firewall agent.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]