Data Center Security Policy Best Practices Checklist
If you’re already familiar with Palo Alto Networks’ platform,
this checklist streamlines planning for and deploying security best
practices in your data center.
Your enterprise’s most valuable assets reside in your
data center, including proprietary source code, intellectual property,
and sensitive company and customer data. Your customers and employees
trust you to maintain the confidentiality and integrity of their
data and expect that data to be always available, so it’s important
to implement a data center best practice security policy that safeguards
your data and prevents successful attacks. It’s not enough to harden
the network perimeter because attacks can originate from inside
the network, attacks can come from partners and contractors whose
credentials have been compromised, and because if an attacker gains
a foothold in your network, the attacker can attack from the inside
of the network by moving laterally from device to device.
If you are familiar with Palo Alto Networks platform, you can save time by using this streamlined
checklist to step through pre-deployment planning, deployment activities, and
post-deployment maintenance to implement and sustain data center security policy best
practices. Each section includes links to detailed information in the full
Data Center Best Practice Security Policy
document or in the
PAN-OS Administrator's Guide, including how to configure
policy rules, security profiles, DoS attack prevention, and user authentication, how to
segment your network, and more.