The BPA evaluates your security posture against Palo Alto Networks best practices and
prioritizes improvements for devices. Security best practices prevent known and unknown
threats, reduce the attack surface, and provide visibility into traffic, so you can know
and control which applications, users, and content are on your network. Additionally,
best practices include checks for the Center for Internet Security’s Critical Security
Controls (CSC). See the
best practices guidance to bolster security
posture and implement improvements.