Data Center Best Practices
Data Center Best Practices
Policy
Version 10.2
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2022-2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
December 8, 2023
Data Center Best Practice Security Policy Version 10.2 2 ©2023 Palo Alto Networks, Inc.
Table of Contents
Data Center Security Policy Best Practices Checklist...............................5
Plan Your Data Center Best Practice Deployment............................................................. 6
Deploy Data Center Best Practices........................................................................................ 9
Global Data Center Objects, Policies, and Actions.................................................. 9
User Data Center Traffic Policies.............................................................................. 13
Internet-to-Data-Center Traffic Policies..................................................................17
Data-Center-to-Internet Traffic Policies..................................................................18
Intra-Data-Center Traffic Policies..............................................................................20
Data Center Security Policy Rulebase Order..........................................................21
Follow Post-Deployment Data Center Best Practices..................................................... 23
Data Center Best Practice Security Policy Version 10.2 3 ©2023 Palo Alto Networks, Inc.
Table of Contents
Data Center Best Practice Security Policy Version 10.2 4 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best
Practices Checklist
Your enterprise’s most valuable assets reside in your data center, including proprietary source
code, intellectual property, and sensitive company and customer data. Your customers and
employees trust you to maintain the confidentiality and integrity of their data and expect that
data to be always available, so it’s important to implement a data center best practice security
policy that safeguards your data and prevents successful attacks. It’s not enough to harden the
network perimeter because attacks can originate from inside the network, attacks can come
from partners and contractors whose credentials have been compromised, and because if an
attacker gains a foothold in your network, the attacker can attack from the inside of the network
by moving laterally from device to device.
If you are familiar with Palo Alto Networks platform, you can save time by using this streamlined
checklist to implement pre-deployment, deployment, and post-deployment data center security
policy best practices. Each section includes links to detailed information in the full Data Center
Best Practice Security Policy document or in the PAN-OS 10.2 Admin Guide, including how to
configure policy rules and security profiles.
• Plan Your Data Center Best Practice Deployment
• Deploy Data Center Best Practices
• Follow Post-Deployment Data Center Best Practices
5
Data Center Security Policy Best Practices Checklist
STEP 2 | Work with stakeholders such as IT/support, security, and groups that require data center
access such as engineering, legal, finance, and HR, to develop an access strategy.
Identify users who need access, and the assets to which they need access. Understanding
this enables you to create user groups based on access level requirements so you can
design efficient Security policy rules by user group.
Identify the applications you want to allow (sanction) in the data center. To reduce the
attack surface, only sanction applications for legitimate business reasons.
Data Center Best Practice Security Policy Version 10.2 6 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
STEP 3 | Assess your data center to understand its current state so you can create a plan to transform
data center security to the desired future state.
Inventory the physical and virtual environment and assets, including:
Servers, routers, switches, security devices, load balancers, and other network
infrastructure.
Standard and proprietary custom applications and the service accounts they use to
communicate. Compare the application inventory list to the list of applications you want
to sanction.
Focus on the applications you want to allow because your allow list Security
policy rules allow them and by default deny all other applications to reduce the
attack surface. Map applications to business requirements. If an application
doesn’t map to a business requirement, evaluate whether you really need to
allow it.
Assess each asset to help prioritize what to protect first. Ask yourself questions such as,
“What defines and differentiates our company?”, “What systems must be available for
daily operations?”, and “If I lost this asset, what are the consequences?”
Work with application, network, and enterprise architects, and with business
representatives to characterize data center traffic flows and learn about typical baseline
traffic loads and patterns so you understand normal network behavior. Use the Application
Command Center widgets and traffic analysis tools to baseline traffic.
STEP 4 | Create a Data Center Segmentation Strategy to prevent malware that gains a foothold in
your data center from moving laterally to infect other systems.
Use firewalls as segmentation gateways to provide visibility into data center traffic and
systems so you can finely control who can use which applications to access which devices.
Segment and secure non-virtualized servers with physical firewalls and the virtual network
with VM-Series firewalls.
Use the firewall’s flexible segmentation tools such as zones, dynamic address groups, App-
ID, and User-ID to design a granular segmentation strategy that protects sensitive servers
and data.
Group assets that perform similar functions and require the same level of security in the
same segment.
Segment data center applications by segmenting the server tiers that make up an
application tier (typically a service chain composed of a web server tier, an application
server tier, and a database server tier) and using the firewall to control and inspect traffic
between tiers.
Consider using an SDN solution inside the data center for an agile, virtualized infrastructure
that maximizes resource utilization and makes automation and scaling easier.
STEP 5 | Plan to use best practice methodology to inspect all data center traffic and gain complete
visibility, reduce the attack surface, and prevent known and unknown threats.
Position physical or virtual firewalls where they can see all data center network traffic.
Take advantage of the firewall’s powerful toolset to create application-based Security policy
rules tied to specific user groups and protected by Security profiles. Forward unknown
Data Center Best Practice Security Policy Version 10.2 7 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
files to WildFire and deploy decryption to prevent threats from entering the data center in
encrypted traffic.
Use GlobalProtect in internal mode as a gateway to control data center access.
Authenticate users to prevent unauthorized access and configure Multi-Factor
Authentication for access to sensitive applications, services, and servers, especially by
contractors, partners, and other third-parties who require access to your data center.
Manage firewalls centrally with Panorama to enforce consistent policy across physical and
virtual environments and for centralized visibility.
If you have multiple data centers, reuse templates and template stacks to apply consistent
security policy across different locations.
STEP 6 | Phase in your best practice deployment over time; start by focusing on the most likely
threats to your business and network, and protect your most valuable assets first.
Taking into account all of the data center users, applications, devices, and traffic flows, and
then creating best practice Security policy around them may seem like an overwhelming task
if you try to do everything at one time. But by protecting your most valuable assets first and
planning a phased, gradual implementation, you can transition in a smooth and practical way
from a hope-for-the-best Security policy to a best practice Security policy that safely enables
applications, users, and content.
Data Center Best Practice Security Policy Version 10.2 8 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
For Security, Authentication, and DoS policy rules, configure log forwarding to
Panorama or external services to centralize logs for convenient viewing and analysis, with
notifications.
STEP 2 | Configure tight data center best practice Security profiles to prevent threats from disrupting
your data center network.
Configure the best practice Antivirus profile by cloning the predefined profile and changing
the imap, pop3, and smtp decoder values to reset-both in the Action and WildFire Action
columns.
Configure the best practice Anti-Spyware profile by cloning the predefined strict profile. On
the Rules tab, enable single packet capture on medium, high, and critical severity threats
for traffic you log. (For traffic you don’t log, apply a separate profile without packet capture
enabled.)
On the DNS Signatures tab, change the Action on DNS Queries to sinkhole if the firewall
can’t see the originator of the DNS query (typically when the firewall is north of the local
DNS server) so that you can identify infected hosts. DNS sinkhole identifies and tracks
potentially compromised hosts that attempt to access suspicious domains and prevents
Data Center Best Practice Security Policy Version 10.2 9 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
them from accessing those domains. Enable extended packet capture on the sinkholed
traffic.
Allow traffic only to sanctioned DNS servers. Use the DNS Security service to
prevent connections to malicious DNS servers.
Configure the best practice Vulnerability Protection profile by cloning the predefined
strict profile and changing the Packet Capture setting for every rule except simple-client-
informational and simple-server-informational to single-packet. If the firewall identifies a
large volume of vulnerability threats and that affects performance, disable packet capture
for low-severity events.
The predefined strict File Blocking profile is the best practice profile. If supporting critical
applications prevents you from blocking all the file types the strict profile blocks (you can
identify the file types used in the data center from data filtering logs at Monitor > Logs >
Data Filtering), clone the strict profile and modify it as needed. If files don’t need to flow
in both directions, use the Direction setting to restrict the file type to only the required
direction.
The predefined WildFire Analysis profile is the best practice profile. WildFire provides the
best defense against unknown threats and advanced persistent threats (ATPs).
STEP 3 | Configure tight data center best practice Decryption profiles to prevent unknown traffic
from entering your data center.
Perform CRL/OCSP checks to ensure that certificates presented during SSL decryption are
valid.
SSL Protocol Settings: Set the Min Version to TLSv1.2, the Max Version to Max, and
uncheck the SHA1 Authentication Algorithm. (The weak 3DES and RC4 Encryption
Algorithms are automatically unchecked when you select TLSv1.2.) Use TLSv1.3 for traffic
that supports TLSv1.3 (many mobile applications use certificate pinning, which prevent
decryption when using TLSv1.3, so for these applications, use TLSv1.2).
SSL Forward Proxy: For Server Certificate Verification, block sessions with expired
certificates, untrusted issuers, and unknown certificate status, and restrict certificate
extensions. For Unsupported Mode Checks, block sessions with unsupported versions,
unsupported cipher suites, and client authentication. For Failure Checks, blocking sessions
if resources aren’t available is a tradeoff between the user experience (blocking may
negatively affect the user experience) and potentially allowing dangerous connections.
If you have to consider this tradeoff, also consider increasing the decryption resources
available in the deployment.
SSL Inbound Inspection: For Unsupported Mode Checks, block sessions with unsupported
versions and unsupported ciphers. For Failure Checks, the tradeoffs are similar to SSL
Forward Proxy.
SSH Proxy: For Unsupported Mode Checks, block sessions with unsupported versions and
unsupported algorithms. For Failure Checks, the tradeoffs are similar to SSL Forward Proxy.
Apply the No Decryption profile to traffic you choose not to decrypt because of
regulations, compliance rules, or business reasons, except TLSv1.3 traffic (TLSv1.3 encrypts
certificate information, so the firewall cannot block traffic based on certificate information).
Block sessions with expired certificates and untrusted issuers.
Data Center Best Practice Security Policy Version 10.2 10 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
STEP 4 | Configure traffic blocking rules to deny traffic you know is malicious or isn’t needed for
business purposes.
Logging and monitoring block rules may reveal users and applications you didn’t know were
on your network and that may be legitimate or may indicate an attack. The rule order in the
Security policy rulebase is critical to prevent shadowing (traffic matching an allow or block rule
before it can match the rule you intend the traffic to match). Some rules are almost the same
but enable separate reporting for standard and non-standard ports or for user applications and
applications from other sources. For each rule, configure Log at Session End on the Actions
tab and set up Log Forwarding to track and analyze rule violations.
Block all applications from user zones on the application-default port. Place this rule after
the rules that allow legitimate application traffic from user zones to identify unknown or
unexpected user applications on standard ports.
Block all applications from user zones on any port to catch user traffic attempting to use
non-standard ports. Place this rule after the preceding application-default block rule to
identify unknown or unexpected user applications on non-standard ports, which may be
custom applications or evasive applications.
Block applications you never want in your data center, such as evasive and commonly
exploited applications and applications not required for business. Place this rule after the
application allow rules so that, for example, you allow sanctioned file sharing applications
before the Filesharing application filter blocks all other file sharing applications.
Block all applications from any zone on the application-default port to identify unexpected
applications on standard ports. Rule matches may indicate potential threats or application
Data Center Best Practice Security Policy Version 10.2 11 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
changes that require modifying an allow rule. Place this rule after the application allow rules
and the preceding block rule.
Block all applications from any zone on any port to identify unexpected applications on
non-standard ports. Don’t allow unknown-tcp, unknown-udp, or non-syn-tcp traffic. Place
this rule after the application allow rules and the preceding block rule.
Block unknown users attempting to run applications on any port to discover unknown
users (gaps in User-ID coverage or attackers) and identify compromised devices (including
embedded devices such as printers, card readers, and cameras). Place this rule after the
application allow rules and the preceding block rule.
In addition to blocking unwanted potentially malicious traffic, block Quick UDP Internet
Connections (QUIC) protocol, unless for business reasons, you want to allow encrypted
browser traffic. Chrome and some other browsers establish sessions using QUIC instead
of TLS, but QUIC uses proprietary encryption that the firewall can’t decrypt, so potentially
dangerous traffic may enter the network as encrypted traffic. Block both the QUIC
application and UDP ports 80 and 443 to force the browser to use TLS. First create a
Service (Objects > Services) that includes UDP ports 80 and 443:
Use the Service to specify the UDP ports to block for QUIC. In the second rule, block the
QUIC application so that the first two rules in your rulebase block QUIC:
STEP 5 | Install Cortex XDR Agent on all data center endpoints to protect against malware and
exploits on the endpoints.
Cortex XDR Agent protects all endpoints the same way, so the deployment process and
malware protection policy best practices are the same for the data center as for any other
network area.
Data Center Best Practice Security Policy Version 10.2 12 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
Block access to external DNS servers at the internet gateway to prevent DNS traffic
from going out on the internet to public servers. Allow access only to sanctioned
DNS servers and use the DNS Security service to prevent connections to malicious
DNS servers.
Allow secured, privileged access to data center management interfaces for the necessary
IT personnel. Restrict the rule to management interfaces (this example uses an address
group to identify the devices and a custom service to identify the management ports) and
the necessary applications, in this example, RDP, SSH, and SSL. Use a dedicated VLAN to
Data Center Best Practice Security Policy Version 10.2 13 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
separate management traffic from other traffic and place management interfaces on the
same subnet.
If the same IT user group also manages switches, routers, and other data center
devices, add them to the destination and add their ports to the custom service so
the rule secures traffic for connections to their management interfaces. If different
IT groups manage different data center resources, create separate Security policy
rules and corresponding Decryption and Authentication policy rules for each group.
Allow required access for employee user groups. These rules limit each user group’s (or
user’s) access to the necessary applications and servers. This example limits an engineering
user group’s access to only its development servers and applications.
Allow targeted, limited access to contractors, partners, customers, and other third-parties.
This example limits access for an SAP contractor group so the group can reach only the
appropriate SAP database servers, using only the appropriate applications.
STEP 2 | Create Authentication policy rules for user traffic to authenticate data center access.
For each user group or user for whom you create application allow rules, create an analogous
authentication rule (except the DNS allow rule because DNS occurs before users authenticate
to log in). For each rule, configure Log at Session End on the Actions tab and set up Log
Forwarding to track and analyze rule violations.
Authenticate users who need specialized access. This example authenticates the IT
personnel who need secure privileged access to manage data center servers from
the preceding step’s allow rule. Because compromising the credentials of a privileged
Data Center Best Practice Security Policy Version 10.2 14 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
user hands an attacker the keys to your data center kingdom, require Multi-Factor
Authentication (MFA) to protect against stolen credentials.
If the same IT user group also manages switches, routers, and other data center
devices, add them to the destination and add their ports to the custom service so
the rule authenticates traffic for connections to their management interfaces. If
different IT groups manage different data center resources, create separate Security
policy rules and corresponding Decryption and Authentication policy rules for each
group.
Authenticate employees with legitimate business reasons to access the data center. This
example authenticates the engineering development user group from the preceding step’s
allow rule.
STEP 3 | Create Decryption policy rules for user traffic to decrypt traffic you allow so the firewall can
see, inspect, and apply Security policy to the traffic.
For each Decryption policy rule, apply the appropriate best practice Decryption profile (SSL
Inbound Inspection, SSL Forward Proxy, SSH Proxy, or No Decryption, including best practice
SSL Protocol Settings for SSL Inbound Inspection and SSL Forward Proxy rules) to block weak
protocols and algorithms and to verify server certificates. For each SSL Inbound Inspection
rule, import the certificate of the of the data center server you are protecting with decryption.
Decrypt traffic from the previously created Security policy rule that allows IT privileged
access to management servers. The Decryption policy rule and its associated Decryption
Data Center Best Practice Security Policy Version 10.2 15 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
profile differ depending on whether the IT group uses SSL (SSL Forward Proxy Decryption
profile) or SSH (SSH Proxy Decryption profile) to access management ports.
If the same IT user group also manages data center switches, routers, and other
devices, add them to the destination and add the server certificates so the rule
decrypts traffic for connections to their management interfaces. If different IT
groups manage different sets of data center resources, create separate, tight
Security policy rules and corresponding Decryption and Authentication policy rules
for each group.
Configure SSL Inbound Inspection to decrypt allowed traffic from employee user groups.
This example decrypts traffic from the analogous engineering development user group
allow rule.
Configure SSL Inbound Inspection to decrypt allowed traffic from contractors, partners,
customers, and other third-parties. This example decrypts traffic from the analogous SAP
contractor user group allow rule.
Apply a No Decryption profile to configure server verification for traffic that you choose not
to decrypt because of business, regulatory, compliance, or other reasons, such as financial,
health, or government traffic. This example shows how to exclude two groups of finance
users from decryption when they access servers in the Fin Servers address group.
Data Center Best Practice Security Policy Version 10.2 16 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
Create similar rules for traffic from the internet to other server groups (if allowed) and other
applications. Make each rule specific to limit access to only the required applications and
servers.
STEP 2 | Create Decryption policy rules for internet-to-data-centertraffic to decrypt allowed traffic.
Configure SSL Inbound Inspection (and import the destination server certificates into the
firewall) to decrypt partner, contractor, and customer traffic that Security policy rules allow for
internet-to-data-center traffic. This example shows the Decryption policy for the preceding
Security policy rule.
Create Decryption rules to match traffic that internet-to-data-center Security policy rules
allow.
STEP 3 | Create internet-to-data-center DoS Protection policy rules to protect sensitive servers from
Denial-of-Service (DoS) attacks by limiting the number of connections-per-second (CPS) the
firewall allows to the servers to prevent a SYN flood attack.
Attackers target the web server tier because if they take it down, they prevent most
legitimate access to the data center. Apply a classified DoS Protection policy rule with a DoS
Data Center Best Practice Security Policy Version 10.2 17 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
Protection profile that limits the incoming CPS to prevent traffic spikes that can affect server
performance and availability.
Create a classified DoS Protection profile to protect the web server tier and prevent SYN
flood attacks. The CPS thresholds you set depend on the baseline peak CPS rate.
Create a DoS Protection policy rule to specify the web servers you’re protecting and apply
the classified DoS Protection profile to it.
To protect against SYN flood attacks from internal sources, create a separate DoS
Protection policy rule that specifies your internal zones as the source zone instead of L3-
External. Separate rules for external and internal attack sources provides separate reporting
that makes investigating attack attempts easier.
In addition, configure Packet Buffer Protection for each data center zone to protect the
firewall from single-session DoS attacks that can cause legitimate traffic to drop.
Data Center Best Practice Security Policy Version 10.2 18 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
addition, use the File Blocking profile’s Direction control to block outbound update files so you
only allow downloading for software update files.
For each rule, apply best practice Security profiles and configure Log at Session End on the
Actions tab.
Work with engineering and other groups that update software to log and analyze web
browsing sessions to define the URLs to which developers connect for updates.
These examples allow engineering servers to communicate with CentOS update servers
(CentOS-Update-Servers custom URL Category) using the yum application and with
Microsoft update servers (Win-Update-Servers custom URL Category) using the ms-update
application (you must also allow ssl because ms-update has a dependency on SSL).
Allow access to DNS and NTP updates (NTP DNS Update Servers custom URL Category).
Block access to external DNS servers at the internet gateway to prevent DNS traffic
from going out on the internet to public servers. Allow access only to sanctioned
DNS servers and use the DNS Security service to prevent connections to malicious
DNS servers.
STEP 2 | Create data-center-to-internet Decryption policy rules to decrypt the traffic allowed in the
preceding Security policy rules.
A compromised update server could download malware and propagate it through the software
update process, so decrypting traffic to gain visibility is critical. Because only service accounts
Data Center Best Practice Security Policy Version 10.2 19 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
initiate update traffic and update traffic has no personal or sensitive information, there are no
privacy issues.
Don’t decrypt traffic to OCSP certificate revocation servers because the traffic usually
uses HTTP, so it’s not encrypted. In addition, SSL Forward Proxy decryption may
break the update process because the firewall acts as a proxy and replaces the client
certificate with a proxy certificate, which the OCSP responder may not accept as valid.
Decrypt traffic between data center and update servers. These two examples decrypt the
CentOS and Windows update traffic allowed by the analogous Security policy rules in the
preceding step.
Decrypt traffic between data center servers and NTP and DNS update servers. This
example decrypts the update traffic allowed by the analogous Security policy rule in the
preceding step.
Data Center Best Practice Security Policy Version 10.2 20 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
applications to prevent misuse. For each rule, configure Log at Session End on the Actions tab
and set up Log Forwarding to track and analyze rule violations.
This example configures rules that allow traffic between application server tiers for two
proprietary internal finance applications for which we created custom applications: Billing-App
and Payment-App.
Allow finance application traffic between the web server tier and the application server tier.
Allow finance application traffic between the application server tier and the database server
tier.
STEP 2 | Create intra-data-center Decryption policy rules to decrypt the traffic allowed in the
preceding Security policy rules.
The data center is a perfect place for attackers to hide because many people think the data
center is safe and don’t look for intruders. But the same basic tenet that’s true in the rest of
the network holds true in the data center: you can’t protect yourself against what you can’t
see. Decrypt encrypted data center traffic so that the firewall can inspect traffic, control
access, make threats visible, and protect your valuable assets.
Not all data center traffic is encrypted. Don’t spend resources to decrypt unencrypted
(cleartext) traffic.
• This rule decrypts traffic flowing between the web server tier and the application server tier
for the Finance department’s billing servers.
• This rule decrypts the traffic flowing between the application server tier and the database
server tier for the Finance department’s billing servers.
Data Center Best Practice Security Policy Version 10.2 21 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
Order the Data Center Security policy rulebase shows the full rulebase from the previous
examples (allow and block rules) in the correct order and explains each rule’s placement.
Data Center Best Practice Security Policy Version 10.2 22 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
STEP 3 | Create custom reports to monitor the block rules, which protect against potential attacks and
also identify policy gaps and unexpected behaviors so you can tune the rulebase.
STEP 4 | Create a custom report to log intra-data-center traffic that matches the predefined
intrazone-default allow rule at the bottom of the rulebase, which allows all traffic within the
same zone by default.
STEP 5 | Enable logging on and create a custom report for data center traffic that matches the
predefined interzone-default rule at the bottom of the rulebase, which denies all traffic
between zones by default.
STEP 7 | Periodically compare the baseline measurements you took during the planning stage
to the current measurements to evaluate progress, identify changes, and find areas of
improvement.
At the same time, revisit your goal for the ideal future state of the network to assess progress.
If you manage firewalls with Panorama, monitor firewall health to compare devices to their
baseline performance and to each other to identify deviations from normal behavior.
STEP 8 | Evolve application allow rules over time because applications evolve, user requirements
change, and content updates modify existing App-IDs and introduce new App-IDs.
Maintain the data center best practice rulebase and review new and modified App-IDs before
you install a new content release so you can modify the rulebase if the changes impact policy.
STEP 9 | Use Palo Alto Networks assessment and review tools to assess your current prevention
posture and your adoption of best practices.
STEP 10 | Refer to the full Data Center Best Practice Security Policy for details about each planning,
deployment, and post-deployment step and how they benefit you.
Data Center Best Practice Security Policy Version 10.2 23 ©2023 Palo Alto Networks, Inc.
Data Center Security Policy Best Practices Checklist
Data Center Best Practice Security Policy Version 10.2 24 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security
Policy
Your enterprise’s most valuable assets reside in your data center, including proprietary source
code, intellectual property, and sensitive company and customer data. Your customers and
employees trust you to maintain the confidentiality of their sensitive data and expect your data
center to be always available because they expect their data to be always available. It’s important
for the integrity and success of your business to implement a data center best practice security
policy that safeguards your data and prevents successful attacks.
The following methods and recommendations provide a blueprint for planning, designing, and
implementing a data center best practice security policy in a phased, prioritized manner. Creating
a data center best practice security policy may be a daunting task if you try to implement every
protection on every area of your network at one time. However, if you evaluate what is most
important to protect and begin implementing your data center best practice security policy by
defending your most valuable assets first, you can transition gradually to a security policy that
allows you to safely enable applications, users, and content without taking undue risks.
The Data Center Security Policy Best Practices Checklist provides an overview of pre-
deployment, deployment, and post-deployment best practices, and a way to implement
best practices more quickly if you don’t need detailed explanations.
25
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 26 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
If an attacker steals the legitimate access credentials of a partner, the attacker can access your
data center disguised as a legitimate user. Then, from the “soft, chewy interior” of your network,
the attacker can use your internal servers and endpoints to move laterally through the network
and compromise critical systems. Once an outside adversary breaches the network, you rely on
network and user segmentation and layered defenses inside the network to protect your data, the
same as when an attack originates from the inside.
Developing a best practice security policy helps protect your data center from attacks regardless
of origin, in a staged and prioritized manner, securing the most valuable assets first and then
Data Center Best Practice Security Policy Version 10.2 27 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 28 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Inspect All Seeing network traffic enables you to identify the presence of attackers.
Traffic to Gain Inspect traffic to see the users, applications, and content that flow into,
Complete through, and out of the data center:
Visibility
Deploy next-generation firewalls in positions where they can inspect all
of the network traffic. Don’t allow traffic to flow into the data center or
between network segments without positioning a firewall to examine the
traffic.
Enable SSL decryption on all traffic entering or exiting the data center,
unless regulations or compliance rules require you to except categories
such as health, finance, government, or military. You must see threats to
protect your network against them. Because more than 50 percent of a
typical network’s traffic is encrypted and that percentage is rising, if you
don’t decrypt traffic, you can’t completely protect your network.
Use App-ID to identify applications, and create custom applications for
proprietary applications, so that the firewall can identify and categorize
those applications appropriately and apply the correct security policy
rule. This is especially important for older legacy applications that are
otherwise categorized as “web-browsing” or “unknown-tcp” instead of
being correctly categorized.
If you have existing Application Override policies that you created solely
to define custom session timeouts for a set a of ports, convert the existing
Application Override policies to application-based policies by configuring
service-based session timeouts to maintain the custom timeout for each
application and then migrating the rule the an application-based rule.
Application Override policies are port-based. When you use Application
Override policies to maintain custom session timeouts for a set of ports,
you lose application visibility into those flows, so you neither know nor
control which applications use the ports. Service-based session timeouts
achieve custom timeouts while also maintaining application visibility.
Enable User-ID on all traffic entering or exiting the data center to map
application traffic and associated threats in its content to users and
services. You enable User-ID on network segments (zones), so you must
segment the network to enable User-ID. Segmenting the network is a best
practice for gaining visibility and reducing the attack surface.
Deploy GlobalProtect in internal mode as a gateway to control access to
the data center. GlobalProtect checks user information to verify users, and
host information to verify that host security is up-to-date, by comparing
the host information to HIP objects and profiles that you define. This
Data Center Best Practice Security Policy Version 10.2 29 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Reduce the The attack surface is all of the points of network interaction, both hardware
Attack Surface and software, including applications, content, and users, along with servers,
switches, routers, and other physical and virtual equipment. Reducing the
attack surface leaves fewer vulnerabilities for attackers to target. The more
you reduce the attack surface, the harder it is to breach the network.
Assess your data center so that you know the applications, content, and
users on the network.
Use positive security enforcement by creating application-based security
policy rules that allow only applications with a legitimate business use
on the network and rules to block all high-risk applications that have no
legitimate use case.
Use the information from assessing the environment to create a strategy
that segments the network into zones based on business requirements,
common functionality, and global policy requirements, so that the
resources in each zone need the same security level. Inside the data
center, segment applications tiers such as databases, web servers,
application servers, development servers, and production servers into
zones. Segmentation enables you to see traffic between different
application tiers because the traffic must traverse a firewall when it flows
between zones.
Granular segmentation enables you to construct security policy rules
that focus on the business requirements of each zone and provide the
appropriate protection to each segment. Segmentation also helps stop
lateral movement of malware into and within the data center because
the combination of App-ID, Content-ID (threat prevention), and User-ID
enable you to identify the traffic that should be allowed access and deny
the rest.
Data Center Best Practice Security Policy Version 10.2 30 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Prevent Security profiles attached to security policy allow rules scan traffic for known
Known threats such as viruses, spyware, application-layer vulnerability exploits,
Threats malicious files, and more. The firewall applies an action such as allow, alert,
drop, block IP, or a connection reset to those threats based on the security
profile configuration.
Follow content update best practices and install content updates as soon as
possible after downloading them to update the security profiles and apply
the latest protections to your data center. Security profiles are fundamental
protections that are easy to apply to security policy rules.
External dynamic lists (EDLs) also protect against known threats. EDLs
import lists of malicious and risky IP addresses, URLs, or domains into the
firewall to prevent known threats. EDLs come from trusted third parties, from
predefined EDLs on the firewall, and from custom EDLs that you create. EDLs
are updated dynamically on the firewall without requiring a commit.
Preventing known threats is another reason that enabling decryption is
important. If you can’t see the threat, it doesn’t matter if you know about it,
you may still be victimized because you can’t see it.
Prevent How do you detect a threat nobody has seen before? The answer is to
Unknown forward all unknown files to WildFire for analysis.
Threats
WildFire identifies unknown or targeted malware. The first time a firewall
detects an unknown file, the firewall forwards the file to its internal
destination and also to the WildFire cloud for analysis. WildFire analyzes
the file (or a link in an email) and returns a verdict to the firewall in as little
as five minutes. WildFire also includes a signature that identifies the file,
transforming the unknown file to a known file. If the file contained a threat,
the threat is now known. If the file is malicious, the next time the file arrives
at the firewall, the firewall blocks it.
You can check verdicts in the WildFire submission logs (Monitor > Logs
> WildFire Submissions). Set up WildFire appliance content updates to
download and install automatically every minute so that you always have the
most recent support. For example, support for Linux and SMB files were first
delivered in WildFire appliance content updates.
In addition:
Data Center Best Practice Security Policy Version 10.2 31 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Manage firewalls centrally with Panorama to consistently enforce policy across physical and
virtual environments and for centralized visibility.
Use positive security enforcement to allow traffic you want on your data center network and
deny the rest.
Create a standardized, scalable design that you can replicate and apply consistently across data
centers.
Get buy-in from executives, IT and data center administrators, users, and other affected
parties.
Phase in next-generation security by focusing on the most likely threats to your particular
business and network, and then determine the most important assets to protect and protect them
first. Ask the following questions to help prioritize the assets to protect first:
1. What makes our company what it is? What properties define and differentiate your company,
and what assets map to those properties? Assets that relate to your company’s proprietary
competitive advantages should be high on the protection priority ladder. For example, a
software development company would prioritize its source code, or a pharmaceutical company
would prioritize its drug formulas.
2. What keeps the enterprise in business? Which systems and applications do you need to support
the daily operation of the company? For example, your active directory (AD) service provides
employee access to applications and workstations. Compromising your AD service gives an
attacker access to all accounts within your enterprise, which gives the attacker full access
your network. Other examples include critical IT infrastructure such as management tools and
authentication servers, and servers that house the most critical data for business operations.
3. If I lost this asset, what would happen? The worse the consequences of losing an asset, the
higher the priority to protect that asset. For example, the user experience may differentiate
a service company, so protecting that experience is high priority. Proprietary processes and
equipment may differentiate a manufacturing company, so protecting the intellectual property
and proprietary designs is high priority. Create a priority list to define what to protect first.
Define the ideal future state of your data center network and work in phases to achieve it.
Periodically revisit your definition to account for changes in your business, new regulatory and
legal requirements, and new security requirements.
Data Center Best Practice Security Policy Version 10.2 32 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 33 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
practice Security policy prevents attackers from moving laterally through the data center and
compromising more systems or exfiltrating data.
Log and Monitor Data Center Traffic— Logging and monitoring allowed and blocked traffic
provides information at all stages of the transition to and maintenance of your data center best
practice security policy. It reveals the applications, users, and traffic patterns on your network,
including those you may not have known were there. This information helps you investigate
potential security issues.
Maintain the Data Center Best Practice Rulebase—Continually monitor your application
allow list so that you can adapt your rules to accommodate new sanctioned applications and
determine how new or modified App-IDs impact your policy.
Order the Data Center Security Policy Rulebase summarizes the Security policy rulebase.
Data Center Best Practice Security Policy Version 10.2 34 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Your initial application inventory doesn’t need to identify every application because
by monitoring the block rules that you configure for the data center best practice
security rulebase, you’ll discover the applications you haven’t identified. Focus
on inventorying the applications and application types that you want to allow.
When you finish developing the application allow list, all applications that you don’t
explicitly allow are denied.
Data Center Best Practice Security Policy Version 10.2 35 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
applications, and reuse an application group in multiple security policy rules. For example,
an application group designed for data center storage applications may include applications
such as crashplan, ms-ds-smb, and NFS.
• Inventory the service accounts that applications use to communicate between servers and
within servers inside the data center. A best practice is to use one service account for each
function instead of using one service account for multiple functions. This limits access to the
service account and makes it easier to understand how the service account was used if a
system is compromised. Another best practice is to identify service accounts that are hard-
coded into the application so that you can write IPS signatures against them and monitor
the use of the accounts.
2. Characterize data center traffic—Characterize and map data center traffic to understand
how data flows across your network and between users and resources. Engage a cross-
functional team that includes application architects, network architects, enterprise architects,
and business representatives. Characterizing the traffic flows informs you about network
traffic sources and destinations, typical traffic patterns and loads, and helps you understand
the traffic on your network and prioritize the most important traffic to protect. Use Application
Command Center widgets, Panorama’s firewall health monitoring features, and other methods
to understand the normal (baseline) traffic patterns, which helps you understand abnormal
traffic patterns that may indicate an attack.
3. Assess data center segmentation—Segment data center server tiers so that communication
between different server tiers must pass through the next-generation firewall to be decrypted,
examined, and protected by the best practice security policy, and so that communication from
the user population or the internet passes through a next-generation firewall. Outside the
data center, understand which zones can communicate with each data center zone, and then
determine which zones should be allowed to communicate with each data center zone.
4. Assess user population segmentation and determine who should have access to the data
center—Map users to groups to segment the user population so that you can more easily
control access to sensitive systems. For example, users in the Product Management group
should not be able to access finance or human resource systems. In Active Directory (or
whatever system you use), create granular groups of users based on the access level the
users require for legitimate business purposes so that you can control access to systems and
applications. This includes different employee groups as well as different contractor, partner,
customer, and vendor groups, grouped by the level of access needed.
Reduce the attack surface by creating user groups based on access requirements rather than
just functionality, and grant only the appropriate level of application access to each group.
Within a functional area such as Marketing or Contractors, create multiple user groups mapped
to application access requirements.
5. Continuously monitor the data center network—Log and Monitor Data Center Traffic to reveal
gaps in the data center best practice security policy, to expose unusual traffic patterns or
unexpected access attempts that may indicate an attack, and to diagnose application issues.
A helpful method for evaluating assets is grouping assets. Identify your most valuable assets that
need to be protected first, and identify the assets that you can iterate on after protecting those
assets. Prioritize the order in which to protect the assets in each category. Organize assets in the
way that makes the most sense for your particular business. The following table shows you some
possibilities, but it’s not comprehensive. Also consider legal compliance requirements to protect
data such as passwords, personal information, and financial information when prioritizing which
assets to protect first.
Data Center Best Practice Security Policy Version 10.2 36 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Asset priority is unique to each business. For a service company, the user experience may
differentiate the business from other businesses, so the most valuable assets may be assets that
ensure the best user experience. For a manufacturing company, the most valuable assets may be
proprietary processes and equipment designs. Considering the consequences of losing an asset is
a good way to figure out which assets to protect first.
Data Center Best Practice Security Policy Version 10.2 37 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 38 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Decrypting traffic consumes firewall resources. The amount of traffic to decrypt varies
with each data center. When sizing the firewall deployment to maintain acceptable
performance while supporting decryption, take into account the amount of traffic you
expect to decrypt (some applications must be decrypted while other applications aren’t
encrypted and don’t need to be decrypted), the decryption cipher (stronger, more complex
ciphers require more processing power to decrypt), the size of the keys (larger keys
consume more decryption resources), the type of key exchange (for example, RSA key
exchanges consume more processing resources than PFS keys), and the capacity of the
firewalls. Work with your Palo Alto Networks sales team and representatives to size the
firewall deployment appropriately for your particular network so that you can decrypt
traffic and expose threats.
Companies with businesses such as banking that require extremely strong security for their
private keys can use a third-party hardware security module (HSM) to safeguard and manage the
company’s private key instead of storing it on the firewall.
• Create the Data Center Best Practice Decryption Profiles
• Exclude Unsuitable Traffic from Data Center Decryption
Data Center Best Practice Security Policy Version 10.2 39 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
STEP 2 | Configure the SSL Decryption > SSL Protocol Settings to block vulnerable SSL/TLS versions
such as TLSv1.0, TLSv1.1, and SSLv3, and to avoid weak encryption algorithms such as RC4
and 3DES, and weak authentication algorithms such as MD5 and SHA1.
SSL Protocol Settings apply to all decrypted traffic.
Set the protocol Min Version to TLSv1.2 and the Max Version to Max to block weak
protocols. Use the strongest TLS protocol that you can. Create separate Decryption policies
and profiles to maximize security. For example, if legacy sites you need for business purposes
only support weaker protocols, create a separate Decryption profile to allow the weaker
protocol and apply it in a Decryption policy only to sites that don’t support at least TLSv1.2.
This also applies to necessary business sites that don’t support strong algorithms and for
different URL Categories to fine tune security vs. performance.
If the site doesn’t house a legitimate business application, don’t weaken your security posture
to support the site—weak protocols and ciphers contain known vulnerabilities that attackers
can exploit. If the site belongs to a category of sites that you don’t need for business purposes,
use URL Filtering to block access to the entire category. Don’t support weak protocols or weak
Data Center Best Practice Security Policy Version 10.2 40 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Many mobile applications use pinned certificates. Because TLSv1.3 encrypts certificate
information, the firewall can’t automatically add these mobile applications to the SSL
Decryption Exclusion List. For these applications, ensure that the Decryption profile
Max Version is set to TLSv1.2 or apply a No Decryption policy to the traffic.
Data Center Best Practice Security Policy Version 10.2 41 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
STEP 3 | Configure the SSL Decryption > SSL Forward Proxy settings for outbound traffic to block
exceptions during TLS negotiation and block sessions that can’t be decrypted.
In some cases, the best practice settings depend on your company’s security compliance rules.
Apply the SSL Forward Proxy Decryption profile to security policy rules that control outbound
traffic.
Block exceptions during TLS negotiation and block sessions that can’t be decrypted.
• Server Certificate Verification—Whether to check the Block sessions on certificate status
check timeout box depends on your company’s security compliance stance because
it’s a tradeoff between tighter security and a better user experience. Certificate status
verification examines the Certificate Revocation List (CRL) on a revocation server or uses
Online Certificate Status Protocol (OCSP) to find out if the issuing CA has revoked the
certificate and the certificate should not be trusted. However, revocation servers can
be slow to respond, which can cause the session to timeout and the firewall to block the
session even though the certificate may be valid. If you Block sessions on certificate status
check timeout and the revocation server is slow to respond, you can use Device > Setup
Data Center Best Practice Security Policy Version 10.2 42 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
> Session > Decryption Settings and click Certificate Revocation Checking to change the
default timeout value of five seconds to another value.
Enable both CRL and OCSP certificate revocation checking because server certificates can
contain the CRL URL in the CRL Distribution Point (CDP) extension or the OCSP URL in the
Authority Information Access (AIA) certificate extension.
Although the best practice is to use a proper certificate, some certificates leave the Subject
Alternate Name (SAN) field blank, which can cause firewalls to reject those certificates.
Check Append certificate’s CN value to SAN extension to automatically copy the certificate
number to the SAN field if the SAN field is blank, so that if you do business with sites that
don’t populate the certificate’s SAN field, you can accept their certificates. Otherwise, the
sites need to regenerate their certificates to conform to proper practice and populate the
SAN field.
Block all other server certificate verification exceptions.
• Unsupported Mode Checks—If you don’t block sessions with unsupported versions and
unsupported cipher suites, then users receive a warning message that they can click
through to reach the risky website. The reason you configure tight SSL Protocol Settings
is to block and protect you from servers that use these weak (risky) protocol versions and
algorithms. In addition, blocking sessions with unsupported mode checks protects you from
malicious backdoors and other threats that use custom and non-standard encryption to
obfuscate their activities.
Block sessions with client authentication enables you to choose whether to allow or block
sessions that use client authentication. Although server authentication can be the only
authentication used to establish a session, some sites use mutual authentication, where
both the server and the client authenticate to establish a session. Client authentication
using an X.509 Digital Certificate is similar to server authentication in that both methods
use a digital certificate issued by a trusted Certificate Authority to authenticate a session.
The client certificate acts as a digital identifier for the client, resides on the client device,
and can’t be ported to other devices. However, client authentication prevents the
firewall from decrypting the session because the firewall needs both the client and server
Data Center Best Practice Security Policy Version 10.2 43 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
certificates to perform bi-directional decryption, but the firewall only knows the server
certificate. This breaks decryption for client authentication sessions.
If you don’t enable Block sessions with client authentication, when the firewall attempts to
decrypt a session that uses client authentication, the firewall allows the session and adds
an entry in its local decrypt exclude cache that contains the server URL/IP address, the
application, and the Decryption profile. Entries remain in the cache for 12 hours and then
age out. If the same user or a different user attempts to access the server within 12 hours
using client authentication, the firewall matches the session to the decrypt exclude cache
entry, does not attempt to decrypt the traffic, and allows the encrypted session.
If the exclude cache becomes full, the firewall purges the oldest entries as new entries
arrive. If you change the Decryption policy or profile, the firewall flushes the exclude cache
because changing the policy or profile can change the classification outcome of the session.
If you enable Block sessions with client authentication, the firewall blocks sessions that
use client authentication, with the exception of sessions from sites on the SSL Decryption
Exclusion list (Device > Certificate Management > SSL Decryption Exclusion).
You may need to allow traffic on your network from other sites that use client
authentication in addition to the Predefined sites on the SSL Decryption Exclusion list.
Create a Decryption profile that allows sessions with client authentication. Add it to a
Decryption policy rule that applies only to the server(s) that house the application. To
increase security even more, you can require Multi-Factor Authentication to complete the
user login process.
For all other traffic, apply the Decryption profile that blocks sessions with client
authentication.
• Failure Checks—If you don’t Block sessions if resources not available, the risk is that a
lack of processing resources may allow potentially dangerous connections. If you block
sessions for which resources aren’t available, it may affect the user experience. Whether to
implement failure checks depends on your company’s security compliance stance and the
importance to your business of the user experience, weighed against tighter security.
If you use a Hardware Security Module (HSM) to store your private keys, whether you
check Block sessions if HSM not available depends on your compliance rules about where
the private key must come from and how you want to handle encrypted traffic if the HSM
isn’t available. For example, if your company mandates the use of an HSM for private key
signing, then block sessions if the HSM isn’t available. However, if your company is less
strict about this, then you can consider not blocking sessions if the HSM isn’t available. (If
the HSM is down, the firewall can process decryption for sites for which it has cached the
response from the HSM, but not for other sites.) The best practice in this case depends
on your company’s policies. If the HSM is critical to your business, run the HSM in a high-
availability (HA) pair (PAN-OS 8.0 supports two members in an HSM HA pair).
• Block downgrade on no resource—Prevents the firewall from downgrading TLSv1.3 to
TLSv1.2 if the firewall has no available TLSv1.3 processing resources. If you block the
downgrade, then when the firewall runs out of TLSv1.3 resources, it drops traffic that uses
TLSv1.3 instead of downgrading it to TLSv1.2. If you don’t block downgrade, then when
the firewall runs out of TLSv1.3 resources, it downgrades to TLSv1.2. However, blocking
downgrade when resources aren’t available may affect the user experience by making
sites that users normally can reach temporarily unreachable. Whether to implement this
failure check depends on your company’s security compliance stance and the importance
Data Center Best Practice Security Policy Version 10.2 44 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
of the user experience, weighed against tighter security. You may want to create a separate
Decryption policy and profile to govern decryption for sensitive traffic for which you don’t
want to downgrade the TLS version.
STEP 4 | Configure the SSL Decryption > SSL Inbound Inspection settings to inspect traffic from an
external client to your internal servers and block suspicious sessions.
Apply the SSL Inbound Inspection Decryption profile to security policy rules that control
inbound traffic.
• Unsupported Mode Checks—The firewall can’t decrypt session versions and ciphers that
the firewall doesn’t support. To prevent attackers from using unsupported versions and
ciphers to sneak onto the network, block session versions and cipher suites that the firewall
doesn’t support. In addition, blocking sessions with unsupported mode checks protects you
from malicious backdoors and other threats that use custom and non-standard encryption
to obscure their activities.
On the server, enable only the ciphers that you support on the firewall. Ensuring this
compatibility makes the negotiation between the client and the server smoother.
• Failure Checks—If you don’t Block sessions if resources not available, the risk is that a
lack of processing resources may allow potentially dangerous connections. If you block
sessions for which resources aren’t available, it may affect the user experience. Whether to
implement failure checks depends on your company’s security compliance stance and the
importance to your business of the user experience, weighed against tighter security.
If you use a Hardware Security Module (HSM) to store your private keys, whether you
check Block sessions if HSM not available depends on your compliance rules about where
the private key must come from and how you want to handle encrypted traffic if the HSM
isn’t available. For example, if your company mandates the use of an HSM for private key
signing, then block sessions if the HSM isn’t available. However, if your company is less
strict about this, then you can consider not blocking sessions if the HSM isn’t available. (If
the HSM is down, the firewall can process decryption for sites for which it has cached the
response from the HSM, but not for other sites.) The best practice in this case depends
Data Center Best Practice Security Policy Version 10.2 45 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
on your company’s policies. If the HSM is critical to your business, run the HSM in a high-
availability (HA) pair (PAN-OS 8.0 supports two members in an HSM HA pair).
• Block downgrade on no resource—Prevents the firewall from downgrading TLSv1.3 to
TLSv1.2 if the firewall has no available TLSv1.3 processing resources. If you block the
downgrade, then when the firewall runs out of TLSv1.3 resources, it drops traffic that uses
TLSv1.3 instead of downgrading it to TLSv1.2. If you don’t block downgrade, then when
the firewall runs out of TLSv1.3 resources, it downgrades to TLSv1.2. However, blocking
downgrade when resources aren’t available may affect the user experience by making
sites that users normally can reach temporarily unreachable. Whether to implement this
failure check depends on your company’s security compliance stance and the importance
of the user experience, weighed against tighter security. You may want to create a separate
Decryption policy and profile to govern decryption for sensitive traffic for which you don’t
want to downgrade the TLS version.
STEP 5 | For SSH traffic, configure SSH Proxy Decryption profile settings.
SSH Decryption allows normally routed SSH traffic and denies SSH tunneling (SSH port
forwarding) traffic, but doesn’t perform content or threat inspection on the SSH traffic. SSH
tunneling sessions can tunnel X11 Windows packets and TCP packets. One SSH connection
may contain multiple channels. When you apply an SSH Decryption profile to traffic, for each
channel in the connection, the firewall examines the App-ID of the traffic and identifies the
channel type. The channel type can be:
• session
• X11
• forwarded-tcpip
• direct-tcpip
When the channel type is session, the firewall identifies the traffic as allowed SSH traffic such
as SFTP or SCP. When the channel type is X11, forwarded-tcpip, or direct-tcpip, the firewall
identifies the traffic as SSH tunneling traffic and blocks it.
For most user groups, you probably won’t allow SSH traffic in the data center. SSH is usually
used for remote access to servers, which is not a capability you want most users to have
because it places your data center servers at greater risk, for access to Linux servers, and for
file transfers. You can’t decrypt SSH traffic, so anyone who uses SSH to access data center
Data Center Best Practice Security Policy Version 10.2 46 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
resources must be trusted—and even so, all of the threat profiles should be attached to any
rule that allows SSH access to scan for malware, viruses, spyware, etc.
An example use case for SSH is IT personnel who manage and maintain data center servers
and use SSH for remote access.
• Unsupported Mode Checks—The firewall can’t decrypt session versions and ciphers that
the firewall doesn’t support and unsupported versions and ciphers may be vulnerable. To
prevent attackers from using unsupported versions and ciphers to sneak onto the network,
block session versions and cipher suites that the firewall doesn’t support. In addition,
blocking sessions with unsupported mode checks protects you from malicious backdoors
and other threats that use custom and non-standard encryption to obscure their activities.
• Failure Checks—If you don’t Block sessions if resources not available, the risk is that a
lack of processing resources may allow potentially dangerous connections. If you block
sessions for which resources aren’t available, it may affect the user experience. Whether to
implement failure checks depends on your company’s security compliance stance and the
importance to your business of the user experience, weighed against tighter security.
STEP 6 | For traffic that you choose not to decrypt, configure the No Decryption settings to block
encrypted sessions destined for sites with expired certificates or untrusted issuers.
Apply the No Decryption profile only to traffic that you choose not to decrypt because of
regulations or compliance rules, not to traffic that can’t be decrypted because of technical
Data Center Best Practice Security Policy Version 10.2 47 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
reasons, such as a pinned certificate (add that traffic to the SSL Decryption Exclusion List). The
best practice is to decrypt as much data center traffic as possible.
Do not attach a No Decryption profile to Decryption policies for TLSv1.3 traffic that
you don’t decrypt. Unlike previous versions, TLSv1.3 encrypts certificate information,
so the firewall has no visibility into certificate data and therefore cannot block sessions
with expired certificates or untrusted issuers, so the profile has no effect. (The firewall
can perform certificate checks with TLSv1.2 and earlier because those protocols do not
encrypt certificate information and you should apply a No Decryption profile to their
traffic.) However, you should create a Decryption policy for TLSv1.3 traffic that you
don’t decrypt because the firewall doesn’t log undecrypted traffic unless a Decryption
policy controls that traffic.
Data Center Best Practice Security Policy Version 10.2 48 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
If the technical reason for excluding a site from decryption is an incomplete certificate
chain, you can use the information in the Decryption log to repair the incomplete
certificate chain so that you can allow, decrypt, and inspect the traffic.
You may choose not to decrypt traffic for reasons such as regulations and legal compliance.
For example, the European Union (EU) General Data Protection Regulation (GDPR) will require
strong protection of all personal data for all individuals. The GDPR affects all companies, including
foreign companies, that collect or process the personal data of EU residents. Different regulations
and compliance rules may mean that you treat the same data differently in different countries
or regions. Businesses usually can decrypt personal information in their corporate data centers
because the business owns the information. The best practice is to decrypt as much traffic as
possible so that you can see it and apply security protection to it.
For traffic you choose not to decrypt, make sure it really is traffic you don’t want to decrypt,
and then create a policy-based exclusion that specifies the application, user group, source and
destination, URL category, and/or service to limit each exclusion as much as possible. The more
specific the decryption exclusion, the better, so that you don’t inadvertently exclude more traffic
than necessary from decryption.
Data Center Best Practice Security Policy Version 10.2 49 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 50 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
segment different internal company departments such as Marketing, Engineering, and Human
Resources, and to segment customer resources and customer-hosted applications.
Consider using zone protection profiles to protect zones against floods, reconnaissance
activities (port scans and host sweeps), Layer 3 packet-based attacks, and non-IP protocol
(Layer 2) packet-based attacks.
• Dynamic address groups —For this purpose, dynamic address groups are lists of IP addresses
that the firewall imports and uses in security policy to define server groups dynamically instead
of statically. Adding and removing IP addresses from a dynamic address group updates security
policy automatically, without a commit action on the firewall. Within a zone, using dynamic
address groups in security policy allow rules enables server-to-server interaction for specified
applications and services. For example, in NSX, use dynamic address groups to segment the
server tiers within an application tier.
• User-ID —Enable User-ID to create application allow rules based on user groups to segment
users from applications and server groups.
When you design your data center segmentation plan, keep in mind the following general
guidelines:
• How to Assess Your Data Center, so that you can segment it in stages and protect the most
valuable and sensitive assets first.
• Use an SDN solution (such as NSX, ACI, OpenStack) inside the data center to provide a
scalable, agile, virtualized infrastructure. SDN is the best way to centralize data center network
management, maximize compute resource utilization, scale and automate the network, and
control and secure traffic on a virtualized network. Although you can create a non-SDN
architecture that essentially replicates an SDN architecture, it’s difficult and time consuming to
do, prone to errors that result in outages, and is not considered a best practice. SDN solutions
maximize the use of the underlying data center compute resources without sacrificing security.
• Use physical next-generation firewalls to segment and secure non-virtualized legacy servers
and use VM-Series firewalls to segment and secure the virtual data center network.
• Group assets that perform similar functions and require the same level of security in the same
data center segment. For example, place servers that connect to the internet in the same
segment.
Base your segmentation plan on multiple criteria to develop the right plan to secure your business.
Data Center Best Practice Security Policy Version 10.2 51 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Each server tier contains functionally similar servers that work together so that an application tier
can present an application to a user.
The server tiers within each application tier create a service chain of VMs. Service chains steer
traffic through virtual data center appliances to provide application services. Within an application
tier, a web server may communicate with an application server that houses the application
code, and that application server may communicate with a database server that houses content.
The communication between the three servers, which reside in different server tiers within an
application tier, is the service chain.
Data centers contain many application tiers, which may be dedicated to particular departments,
customers, contractors, or other groups. Segment the data center application infrastructure
to prevent unauthorized and unnecessary communication among application resources and to
inspect application traffic.
Application tier Segment the server tiers within each application tier by configuring a
separate firewall zone for each server tier, so that you can control access
to each set of servers and examine the traffic flowing between each
server tier as it traverses the firewall. For example, place web servers,
application servers, and database servers in separate zones so that traffic
between server tiers always goes through a next-generation firewall for full
inspection.
Depending on business requirements, you may need to create more than
one zone for each application tier to separate tenants, to load balance, to
use application tiers for different purposes, to provide different levels of
security, or to connect to different sets of servers. Segment the data center
to reduce the attack surface of each application tier by grouping in the
same zone only servers that require similar levels of trust and that need to
communicate with similar application tiers.
Web server tier Traffic normally enters the data center through web servers, although there
are special cases such as IT configuring direct secured access to data center
servers for management purposes. As with the other server tiers, create a
separate zone for the web server tier so that you can apply granular security
policy to it.
Data Center Best Practice Security Policy Version 10.2 52 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Infrastructure Segment the servers that provide critical infrastructure services such as
service DNS, DHCP, and NTP, and allow access only to their specific IP addresses,
application using only the appropriate applications.
servers
Allow traffic only to sanctioned DNS servers. Use the DNS
Security service to prevent connections to malicious DNS servers.
Applications Use App-ID to create application-based allow list security policy rules that
segment applications by controlling who can access each application and on
which sets of servers (using dynamic address groups). App-ID enables you
to apply granular security policy rules to applications that may reside on the
same compute resource but require different levels of security and access
control.
Create custom applications to uniquely identify proprietary applications and
segment access. If you have existing Application Override policies that you
created solely to define custom session timeouts for a set a of ports, convert
the existing Application Override policies to application-based policies by
configuring service-based session timeouts to maintain the custom timeout
for each application and then migrating the rule the an application-based
rule. Application Override policies are port-based. When you use Application
Override policies to maintain custom session timeouts for a set of ports, you
lose application visibility into those flows, so you neither know nor control
which applications use the ports. Service-based session timeouts achieve
custom timeouts while also maintaining application visibility.
For migrating from a port-based security policy with custom application
timeouts to an application-based policy, don’t use Application Override
rules to maintain the custom timeouts because you lose visibility into the
applications. Instead, define a service-based session timeout to maintain
the custom timeout for each application, and then migrate the rule to an
application-based rule.
Don’t use next-generation firewalls to segment servers within a particular server tier. When you
need to prevent intercommunication of servers within a server tier, use a traditional rule such as
Data Center Best Practice Security Policy Version 10.2 53 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
NSX DFW to open a port or block traffic within the tier. However, servers within a server tier
often need to intercommunicate. For example, a database server tier may be a server cluster that
requires free intercommunication.
Data Center Best Practice Security Policy Version 10.2 54 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Download content updates automatically and install them as soon as possible so that
you have the latest threat prevention signatures and content (antivirus, anti-spyware,
vulnerabilities, malware, etc.) on the firewall and block the latest threats.
Create one or more Security profile groups so that you can apply all of the profiles to a
Security policy rule at one time instead of specifying them individually.
You don’t need a URL Filtering subscription for data center firewalls if there is no direct outbound
connection to the internet. Firewalls that don’t connect directly to the internet don’t need the
PAN-DB URL Filtering solution because it identifies internet URLs, not private data center URLs,
so importing the PAN-DB database and checking URLs against it doesn’t apply to data center
traffic. If you’re not sure whether a firewall has URL traffic, get a trial URL Filtering subscription
and set the profile to alert on all URL categories to identify any URL traffic. Otherwise, URL
Filtering should take place on firewalls at the network perimeter where user traffic enters and
exits the network, not at the data center perimeter. Consider creating custom URL categories
(Objects > Custom Objects > URL Category) to identify and control access to internal data center
web services.
Data Center Best Practice Security Policy Version 10.2 55 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Red triangles in the upper left corner of a cell indicates that the action is modified (changed from
the default) and the name of the modified profile is Strict_AV.
Attach the best practice Antivirus profile to all security policy rules that allow traffic to block
known malicious files (malware, ransomware bots, and viruses) as they attempt to enter the
network. For example:
• Intra data center traffic—The Antivirus profile, along with the Vulnerability Protection profile,
helps prevent attackers from using exploits to leverage vulnerabilities and spread malware and
hacking tools laterally between servers inside the data center network.
• Traffic from the data center to the internet—The Antivirus profile, along with the Anti-Spyware
profile, helps identify and block command and control traffic and initial downloads of malware
and hacking tools.
Data Center Best Practice Security Policy Version 10.2 56 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Clone the predefined strict Anti-Spyware profile and edit it. To ensure availability for business-
critical applications, take safe transition steps as you move from your current state to the best
practice profile. If you have a sinkhole set up to which you can send traffic for analysis, enable
DNS sinkhole with packet capture to help you track down the endpoint that attempted to resolve
the malicious domain. The best practice Anti-Spyware profile retains the default Action to reset
the connection when the firewall detects a medium, high, or critical severity threat, and enables
single packet capture (PCAP) for those threats.
Don’t enable PCAP for informational activity because it generates a relatively high volume of
that traffic and it’s not particularly useful compared to potential threats. Apply extended PCAP
(as opposed to single PCAP) to high-value traffic to which you apply the alert Action. Apply
PCAP using the same logic you use to decide what traffic to log—take PCAPs of the traffic you
log. Apply single PCAP to traffic you block. The default number of packets that extended PCAP
records and sends to the management plane is five packets, which is the recommended value. In
most cases, capturing five packets provides enough information to analyze the threat. If too much
PCAP traffic is sent to the management plane, then capturing more than five packets may result in
dropping PCAPs.
The best practice Action on DNS Queries is to block or to sinkhole DNS queries for known
malicious domains and when you don’t have visibility into DNS queries, and to enable PCAPs.
Allow traffic only to sanctioned DNS servers. Use the DNS Security service to prevent
connections to malicious DNS servers.
Data Center Best Practice Security Policy Version 10.2 57 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Enabling DNS sinkhole identifies potentially compromised hosts that attempt to access suspicious
domains by tracking the hosts and preventing them from accessing those domains. Enable DNS
sinkhole when the firewall can’t see the originator of the DNS query (typically when the firewall is
north of the local DNS server) so that you can identify infected hosts. Don’t enable DNS sinkhole
when the firewall can see the originator of the DNS query (typically when the firewall is south of
the local DNS server; in this case, the firewall’s blocking rules and logs provide visibility into the
traffic) or on traffic you block.
In addition to protecting hosts with DNS sinkholing, attach the best practice Anti-Spyware
profile to all security policy rules that allow traffic to identify infected hosts as traffic leaves the
network and to stop attackers by preventing compromised systems from communicating with the
malicious C2 network. If a system can’t communicate with the C2 network, the C2 network can’t
control the system. For example:
• Traffic from users to the data center, intra data center traffic, and traffic from the internet to
the data center—The Anti-Spyware profile blocks peer-to-peer C2 traffic.
• Traffic from the data center to the internet—The Anti-Spyware profile, along with the Antivirus
profile, helps identify and block C2 traffic and initial downloads of malware and hacking tools.
Data Center Best Practice Security Policy Version 10.2 58 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Don’t enable PCAP for informational activity because it generates a relatively high volume of
that traffic and it’s not particularly useful compared to potential threats. Apply extended PCAP
(as opposed to single PCAP) to high-value traffic to which you apply the alert Action. Apply
PCAP using the same logic you use to decide what traffic to log—take PCAPs of the traffic you
log. Apply single PCAP to traffic you block. The default number of packets that extended PCAP
records and sends to the management plane is five packets, which is the recommended value. In
most cases, capturing five packets provides enough information to analyze the threat. If too much
PCAP traffic is sent to the management plane, then capturing more than five packets may result in
dropping PCAPs.
The reason to attach the best practice Vulnerability Protection profile to all security policy rules
that allow traffic is because if you don’t have strict vulnerability protection, attackers can leverage
client- and server-side vulnerabilities to compromise the data center. For example:
• Intra data center traffic—A strict Vulnerability Protection profile, along with the Antivirus
profile, helps prevent attackers from using exploits to leverage vulnerabilities and spread
malware and hacking tools laterally between servers inside the data center network.
• Traffic from the data center to the internet—Vulnerability protection helps prevent infected
data center servers from compromising internet servers.
• Traffic from the internet to the data center—A strict Vulnerability Protection profile blocks
attempts to compromise data center servers with server-side vulnerabilities. If a server is
compromised, vulnerability protection helps prevent the infected server from serving exploits
to clients, isolating the infection and protecting your partners and customers from watering
hole attacks. Vulnerability protection also stops brute force attacks using the Block IP action.
When brute force attack signatures trigger the action, the firewall blocks the attacker’s IP
address for a configured period of time. If the brute force attack resumes after the time period
expires, the signatures again trigger the blocking action. The brute force attack may continue,
but it never succeeds.
Data Center Best Practice Security Policy Version 10.2 59 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
In some cases, the need to support critical applications may prevent you from blocking
all of the strict profile’s file types. Follow the safe transition advice to help determine
whether you need to make exceptions in different areas of the network. Review the data
filtering logs (Monitor > Logs > Data Filtering) to identify file types used in the data center
and talk with business stakeholders about the file types their applications require. Based
on this information, if necessary, clone the strict profile and modify it as needed to allow
only the other file type(s) that you need to support the critical applications. You can also
use the Direction setting to restrict files types from flowing in both directions or block files
in one direction but not in the other direction.
The reason to attach the best practice File Blocking profile to all security policy rules that allow
traffic is to help prevent attackers from delivering malicious files to the data center through file
sharing applications and exploit kits, or by infecting users who access the data center, or on USB
sticks.
• Traffic from users to the data center—Attach the strict File Blocking profile to security policy
rules for applications that don’t entail file sharing or collaboration to block dangerous file types
that can deliver exploits and malware.
• Intra data center traffic—Attach the strict File Blocking profile to security policy rules to
prevent a compromised server from sharing a malicious file with other servers in the data
center. This isolates the infection and prevents the spread of malware through the data center.
• Traffic from the data center to the internet—Limit file transfers to the file types required by the
application in use.
If you don’t block all Windows PE files, send all unknown files to WildFire for analysis. For user
accounts, set the Action to continue to help prevent drive-by downloads where malicious web
sites, emails, or pop-ups cause users to inadvertently download malicious files. Educate users that
Data Center Best Practice Security Policy Version 10.2 60 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
a continue prompt for a file transfer they didn’t knowingly initiate may mean they are subject to a
malicious download.
Set up WildFire appliance content updates to download and install automatically every
minute so that you always have the most recent support. For example, support for Linux
files and SMB files were first delivered in WildFire appliance content updates.
The reason to attach the default WildFire Analysis profile to all security policy rules that allow
traffic is because WildFire provides the best defense against unknown threats and advanced
persistent threats (APTs). For example:
• Traffic from users to the data center—WildFire identifies unknown malware hosted in the data
center such as Confluence or SharePoint.
• Intra data center traffic—WildFire identifies unknown malware spreading among the data
center servers, which can prevent the exfiltration of data by discovering the malware before it
can do damage.
Data Center Best Practice Security Policy Version 10.2 61 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
• Traffic from the data center to the internet—Because this traffic downloads executables
for software and operating system updates, it’s critical to run WildFire on all applications to
identify malicious behaviors.
Set up alerts for malware through email, SNMP, or a syslog server so that the firewall immediately
notifies you when it encounters a potential issue. The faster you isolate a compromised host, the
lower the chance that the previously unknown malware has spread to other data center devices,
and the easier it is to remediate the issue.
If necessary, you can restrict the applications and file types sent for analysis based on the traffic’s
direction.
WildFire Action settings in the Antivirus profile may impact traffic if the traffic generates
a WildFire signature that results in a reset or a drop action. You can exclude internal
traffic such as software distribution applications through which you deploy custom-built
programs to transition safely to best practices, because WildFire may identify custom-
built programs as malicious and generate a signature for them. Check Monitor > Logs
> WildFire Submissions to see if any internal custom-built programs trigger WildFire
signatures.
Data Center Best Practice Security Policy Version 10.2 62 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 63 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Order the Data Center Security Policy Rulebase shows you how to order these rules with all of
the other rules we create for the four data center traffic flows so that no rule shadows another
rule.
To apply consistent security policy across multiple data centers, you can reuse templates
and template stacks so that the same policies apply to every data center. The templates
use variables to apply device-specific values such as IP addresses, FQDNs, etc., while
maintaining a global security policy and reducing the number of templates and template
stacks you need to manage.
Data Center Best Practice Security Policy Version 10.2 64 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
enter the network as encrypted traffic. Blocking QUIC forces the browser to fall back to TLS
and enables the firewall to decrypt the traffic.
Create a Security policy rule to block QUIC on its UDP service ports (80 and 443) and create
a separate rule to block the QUIC application. For the rule that blocks UDP ports 80 and 443,
create a Service (Objects > Services) that includes UDP ports 80 and 443:
Use the Service to specify the UDP ports to block for QUIC. In the second rule, block the
QUIC application so that the first two rules in your rulebase block QUIC:
STEP 2 | Block all applications from user zones on the application-default port to identify unexpected
applications.
This rule discovers applications that users are attempting to use and that you didn’t know
were running on your data center. Monitor traffic that matches this rule to determine if it’s a
potential threat or if you need to modify your allow rules to enable access to the application.
Data Center Best Practice Security Policy Version 10.2 65 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Be sure to place this rule after rules that allow traffic or this rule will block traffic that you
intend to allow.
The rule shown after this rule is similar to this rule, except that it applies to traffic from
any source, not just traffic from user zones. The reason for creating separate rules is
that violations of the user-zone rule may indicate that you’re blocking a legitimate
application which some users need to conduct business, so you may need to modify
a rule to allow the application for a particular set of users. Violations from non-
user zones may indicate a change in an application or a potential attack. Creating a
separate rule for the rest of the traffic enables you to view separate logs for user traffic
and for all other traffic attempting to enter the data center, which makes it easier to
investigate and respond to a potential issue.
This rule must precede the next rule, which applies to all traffic so that you can log
and monitor attempts to use unexpected applications on application-default ports
regardless of the source after you first log violations from user zones.
STEP 3 | Block all applications from user zones on any port to identify applications running where
they shouldn’t run.
This rule identifies legitimate, known applications that users are attempting to run on non-
standard ports as well as unknown applications for which you may need to create custom
applications. Investigate the source of any traffic that matches this rule to ensure that you
Data Center Best Practice Security Policy Version 10.2 66 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
aren’t allowing unknown-tcp, unknown-udp, or non-syn-tcp traffic. Be sure to place this rule
after rules that allow traffic or this rule will block traffic that you intend to allow.
We will also create a different block rule later in this section that is similar to this rule
(Unexpected-App-from-Any-Zone), except that it applies to traffic from any source,
not just traffic from user zones. The reason for creating separate rules is that violations
of the user-zone rule may indicate that a legitimate application which some users need
to conduct business has not been designed correctly, so you may need to modify the
application. Creating a separate rule for the rest of the traffic enables you to view
separate logs for user traffic and for all other traffic attempting to enter the data
center, which makes it easier to investigate and respond to a potential issue.
STEP 4 | Block applications designed to evade or bypass security, that attackers commonly exploit, or
that are not necessary in the data center.
This rule protects the data center from applications that you know you don’t want on your
network. Although the goal of a best practice security policy is positive enforcement using
application allow rules, explicitly blocking and logging potentially dangerous application activity
such as unsanctioned file sharing applications, remote access applications, or encrypted
tunnels, provides visibility into and information about potential attacks. Even after you develop
Data Center Best Practice Security Policy Version 10.2 67 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
a solid application allow list, keep this application blocking rule in the rulebase because logs
from attempted violations help with investigations into potential attacks.
Use this rule to block only applications you never want in your data center.
STEP 5 | Block all applications from any zone on the application-default port to identify unexpected
applications.
This rule discovers applications from any zone that you didn’t know were running on your data
center. Violations of this rule may indicate that an application has changed or may indicate a
Data Center Best Practice Security Policy Version 10.2 68 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
potential threat. Monitor traffic that matches this rule to determine if it’s a potential threat or
if you need to modify your application allow rules. Be sure to place this rule after rules that
allow traffic or this rule will block traffic that you intend to allow, and after the rule in Step 1
so that it doesn’t catch traffic from user zones.
STEP 6 | Block all applications from any zone on any port to identify applications running where they
shouldn’t run.
This rule identifies legitimate, known applications attempting to run on non-standard ports
as well as unknown applications for which you may need to create custom applications.
Investigate the source of any traffic that matches this rule to ensure that you aren’t allowing
unknown-tcp, unknown-udp, or non-syn-tcp traffic. Be sure to place this rule after rules that
allow traffic or this rule will block traffic that you intend to allow, and after the preceding rule
so that it doesn’t catch traffic from user zones.
To create this rule, use the same settings as in the rule Unexpected-App-from-User-Zone,
except instead of specifying the user zones in the source, specify any zone to cover all of the
rest of the traffic attempting to enter the data center, and set the Service to any to cover non-
standard ports.
STEP 7 | Discover unknown users attempting to run any application, on any port.
This rule identifies gaps in User-ID coverage by finding unknown users. It also identifies
compromised or embedded devices in the user community that are trying to access your data
center. (Embedded devices have no user interface, for example, printers, card readers, and
cameras, but adversaries can compromise these devices and use them in an attack.)
This rule is almost the same as the interzone-default rule that prevents communication
between zones (unless another rule allows the traffic), except instead of dropping traffic
from all users, it only drops traffic from unknown users. This enables you to log rule matches
separately and more easily investigate unknown users attempting to access your data center.
Data Center Best Practice Security Policy Version 10.2 69 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Port-based rules Malicious applications access Application allow rules tie together
provide sufficient the network by spoofing applications, users, and servers so that
security because port numbers, tunneling only legitimate users using sanctioned
the data center is through a port, or using port applications can access the right sets of
inside a trusted hopping to avoid detection. data center servers.
network.
When you transition from
port-based to application-
based rules, in the rulebase,
place the application-based
rule above the port-based
rule it will replace. Reset the
policy rule hit counter for
both rules. If traffic hits the
port-based rule, its policy rule
hit count increases. Tune the
application-based rule until
no traffic hits the port-based
rule for a period of time, then
remove the port-based rule.
Data Center Best Practice Security Policy Version 10.2 70 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Trust internal An attacker gains access to Enable User-ID, block unknown users, and
users and allow a data center endpoint and allow access for sanctioned users. Create
the application then moves laterally to any separate identity domains for employees,
the user accesses other data center endpoint partners, and contractors. Use multi-
to determine to exploit stolen credentials factor authentication (MFA) for partner,
whether access or server-side vulnerabilities. contractor, and sensitive server access.
is allowed based Unknown users gain access
on credentials to data center endpoints.
and possibly on IP
address rules.
Analyzing Users may inadvertently Send all unknown files to WildFire for
unknown files download malware from analysis to identify new and unknown
is unnecessary file sharing and other cloud malware and protect against it.
because the data applications.
center is inside a
trusted network.
Tag all sanctioned applications with the predefined Sanctioned tag. Panorama and
firewalls consider applications without the Sanctioned tag as unsanctioned applications.
Order the Data Center Security Policy Rulebase shows you how to order these rules with all of
the other rules we create for the other three data center traffic flows and the block rules so that
no rule shadows another rule.
To apply consistent security policy across multiple data centers, you can reuse templates
and template stacks so that the same policies apply to every data center. The templates
use variables to apply device-specific values such as IP addresses, FQDNs, etc., while
maintaining a global security policy and reducing the number of templates and template
stacks you need to manage.
Data Center Best Practice Security Policy Version 10.2 71 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
At the internet gateway (network perimeter), block all DNS traffic to public DNS
servers. Do not allow DNS traffic to go out to the internet.
This rule is an exception to the best practice of not allowing “any” user in policy rules because
users need to access DNS services before they log in. This rule safeguards access to DNS
services. To create this rule:
• Restrict access to the appropriate Destination Zone in the data center, IT infrastructure.
• Configure an address group for the DNS Servers and restrict access to only that group.
• Prevent access using any application except dns.
• It’s especially import to apply the best practice Security profile group to DNS traffic because
if an attacker hijacks your DNS server, the attacker can redirect traffic to phishing websites
that look like the legitimate websites users are trying to access.
STEP 2 | Allow the necessary IT personnel secured, privileged access to data center servers for
management and maintenance.
This rule shows how to safeguard access to critical systems for users who have privileged
accounts. Privileged accounts require a high level of trust and grant administrative access to
critical systems that contain your company’s most valuable data, so you must tightly control
and monitor privileged accounts. Leverage App-ID to specify only the applications IT users
Data Center Best Practice Security Policy Version 10.2 72 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
need to manage data center devices so that the firewall denies access for all other applications.
In this example, a group of IT users needs administrative access to manage data center servers.
The allowed applications are examples. Allow the applications your IT department
uses to manage data center servers. In some cases, applications over SSL may
require the addition of the specific application to be identified correctly by App-ID.
IT personnel also manage switches, routers, and other devices in the data center. If the
same group of IT users manages those resources using the same applications, you can add
them to the destination zone and address so that the rule allows IT superusers to access the
management interfaces of those devices. If different IT user groups manage different sets of
data center resources or use different applications, create separate, tight security policy rules
for each user group and each set of applications.
Because user groups that have privileged accounts have access to critical systems, when you
Create User-to-Data-Center Authentication Policy Rules, require MFA to prevent access
if attackers compromise their credentials. Create corresponding authentication policy and
decryption policy rules for each privileged access rule.
STEP 3 | Allow access for employee user groups that have legitimate business reasons to
communicate with data center servers.
This rule shows how to limit each user group’s (or in some cases, an individual user’s) access
to only the necessary applications and servers. For example, engineers need to access
development servers in the data center. To create the security policy rule, create a dynamic
Data Center Best Practice Security Policy Version 10.2 73 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
address group that contains the IP addresses of all of the data center development servers
that the group uses, identify the applications the engineers need to use on those servers, and
construct the rule based on those groups.
Similar to the allow rule for engineering user access to data center servers, this rule allows
users in the finance-users and accounting-users groups to use only the specified applications
to access only the servers in the Fin-Servers dynamic address group. The rule applies the best
practice security profiles to allowed traffic and logs activity.
STEP 4 | Allow targeted, limited data center access to contractors, partners, customers, and other
third-parties.
This rule shows how to tightly control access for third-party users so that they can use only
the applications they need on only the servers they need. For example, a company hires a
group of SAP developer contractors. The SAP developers need to access the SAP database in
the data center and make SQL queries. However, SQL also runs on production databases that
the SAP developers should not access. The company needs to control three access vectors:
• User group—SAP developer contractors.
• Applications—MS-SQL and SAP.
• Servers—SAP database servers only. Deny all other data center server access.
The combination of User-ID to isolate the SAP contractor user group, App-ID to limit the
group to using only the necessary applications, and a dynamic address group that limits access
Data Center Best Practice Security Policy Version 10.2 74 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
to only the SAP database servers in the data center enables the company to provide exactly
the access the SAP contractors need to perform their duties, but no more.
Verify that only the applications you explicitly allowed in the security policy rules are running
by viewing the predefined Applications report (Monitor > Reports > Application Reports >
Applications). If you see unexpected applications in the report, review the application allow rules
and refine them so that they don’t allow the unexpected applications.
Data Center Best Practice Security Policy Version 10.2 75 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
STEP 1 | Authenticate employee user groups and individuals that have legitimate business reasons to
use data center servers.
This rule show how to authenticate user groups so that they can access services required for
their business activities on the necessary servers. For example, engineers need to authenticate
before they can access development servers and applications.
Data Center Best Practice Security Policy Version 10.2 76 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
STEP 2 | Authenticate contractors, partners, customers, and other non-employee groups that require
data center access.
This rule requires MFA for third-party user groups such as contractors, partners, and
customers because you have less control over the business and security practices of their
companies and personnel than you do over your employees. Requiring these users to
authenticate with at least two factors protects your data center against credential theft at a
third-party company.
STEP 3 | Authenticate users who need specialized access, such as IT personnel who need secured
access to data center servers for management and maintenance.
This rule shows you how to configure authentication for users who have privileged accounts,
which grant administrative access to critical systems. Because compromising the credentials
of a privileged user hands an attacker the keys to your data center kingdom and its valuable
assets, you need to protect against stolen credentials by requiring at least two factors of
Data Center Best Practice Security Policy Version 10.2 77 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
authentication to ensure that only legitimate users are granted access. This example shows
how to authenticate the right IT users for access to data center server management interfaces.
Do not send credentials in cleartext. For example, if you use RADIUS, use a supported
EAP method to transport credentials securely inside TLS.
Data Center Best Practice Security Policy Version 10.2 78 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
a trusted internal segment), and then expand the effort until you have applied decryption to traffic
destined to all of your data center assets. Decrypt as much traffic as you can while retaining
acceptable performance.
Exclude Unsuitable Traffic from Data Center Decryption. Regulations and compliance
over personal information differ from country to country and even within country regions.
Different companies may have different compliance rules about personal information.
Decrypt as much traffic as you can, but if your data center houses information that
regulations or company rules exempt from decryption, don’t decrypt that traffic.
In Create User-to-Data-Center Application Allow Rules, we created Security policy rules that
allow DNS access, allow engineering users to access engineering development servers, allow SAP
contractor developers to access only the SAP development servers, and allow a particular set of
IT users data center server management access. Here we create decryption policy rules (Policies >
Decryption) to decrypt the traffic that these rules allow.
The decryption policy rules share some common elements in regard to these traffic flows:
• When you create a Decryption policy rule, the objective is to decrypt traffic so that a Security
policy rule can examine it and allow or block it based on policy. To accomplish that, the
Decryption policy rule must use the same source zone(s) and user(s) as the analogous security
policy rule, and the same destination zone and address (often defined by a dynamic address
group so that as you add or remove servers, you can update the firewall without a commit
operation). Defining the same source and destination in the Security policy and in the
Decryption policy applies both policies to the same traffic.
• The Action for all of these rules is decrypt, except in the case of sensitive personal information
as shown in Step 4.
• For each rule, configure decryption logging and log forwarding. Log as much decryption traffic
as your firewall resources permit.
• The decryption rules that use SSL Inbound Inspection to examine incoming traffic require the
appropriate server certificate.
• All of these decryption rules use the Best Practice data center decryption profile shown in
Create the Data Center Best Practice Decryption Profiles.
STEP 1 | Decrypt allowed traffic from employee user groups to data center servers.
This rule shows how to decrypt traffic from a user group to the data center servers that the
group is allowed to access to provide visibility into that traffic. For example, the application
allow rules we created include a Security policy rule that allows engineering users to access
development servers in the data center. To protect the development servers, decrypt incoming
traffic so that the firewall can inspect it and apply threat prevention profiles.
Data Center Best Practice Security Policy Version 10.2 79 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Users zone, and the Destination is the servers specified in the Dev-Servers dynamic address
group in the Engineering-DC-Infra zone.
• On the Options tab, set the Action to Decrypt and the decryption Type to SSL Inbound
Inspection. Specify the server certificate for the development servers and apply the data
center best practice Decryption Profile to apply SSL Inbound Inspection and SSL Protocol
Settings to the traffic.
Create a similar Decryption policy rule for allowed data center traffic of each user group (or
individual user, if applicable) based on the source zone and user group (or user) and on the
destination zone and server group (as defined by the dynamic address group membership).
STEP 2 | Decrypt allowed traffic from contractors, partners, customers, and other third-parties.
This rule shows how to decrypt from third-party groups to the data center servers they are
allowed to access. For example, the allow rules include a security policy rule that allows limited
access for SAP developer contractors to SAP database servers in the data center. Decrypt
incoming traffic so that the firewall can inspect it, apply threat prevention profiles to it, and
protect the SAP data center servers.
STEP 3 | Decrypt privileged allowed access to data center servers (except traffic pertaining to
personal information if regulations or compliance rules prohibit it).
This rule shows how to decrypt traffic for privileged access because you should decrypt
as much traffic as possible to provide the visibility necessary to defend the data center, no
matter how much you trust the users. If you don’t decrypt allowed traffic, you can’t apply
threat prevention profiles, and if the traffic conceals malware or other threats, you won’t see
Data Center Best Practice Security Policy Version 10.2 80 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
them. This example references the Security Policy allow rule we created previously to provide
management interface access to data center servers for IT superusers.
If the IT group that manages and maintains data center servers uses SSH, you can’t
decrypt the SSH traffic. You can configure SSH Proxy to block SSH tunnels and
prevent SSH from tunneling potentially malicious content and applications. If the
IT group uses SSL, create a Decryption Policy rule using SSL Forward Proxy instead
of SSL Inbound Inspection. The reason is that SSL Inbound Inspection requires the
server certificate to perform decryption. Because IT manages many data center
servers, creating SSL Inbound Inspection rules for each server is onerous and difficult to
manage. SSL Forward Proxy decryption scales better in this use case.
The following example shows the Decryption policy rule for the SSL Forward Proxy use case.
Data Center Best Practice Security Policy Version 10.2 81 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
separate, tight security policy rules and corresponding decryption and authentication policy
rules for each user group.
The next example shows the Decryption policy rule for the SSH Proxy use case. You may also
choose not to decrypt the traffic instead of using SSH Proxy decryption.
Data Center Best Practice Security Policy Version 10.2 82 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 83 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 84 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
from the internet to the data center so that you don’t inadvertently download malware that
takes advantage of server vulnerabilities or allow a client to download malware from one of your
company’s servers that could infect partners, customers, or wind up on a website used by your
industry (serving a watering-hole attack).
Ensure that the source of traffic to the data center doesn’t come from malicious IP addresses or
other potentially risky sources, and only allow applications required for business purposes. Don’t
allow unnecessary (and especially unknown) applications in the data center. To do these things:
• Create allow rules that control the sanctioned and allowed applications that external devices
can use to communicate with your data center.
Tag all sanctioned applications with the predefined Sanctioned tag. Panorama
and firewalls consider applications without the Sanctioned tag as unsanctioned
applications.
• Create an External Dynamic List to identify bad IP addresses and use it to prevent them from
accessing your data center.
• Create a custom application for any proprietary application so that you can identify the
application and apply security to it.
If you have existing Application Override policies that you created solely to define custom
session timeouts for a set a of ports, convert the existing Application Override policies to
application-based policies by configuring service-based session timeouts to maintain the
custom timeout for each application and then migrating the rule the an application-based rule.
Application Override policies are port-based. When you use Application Override policies to
maintain custom session timeouts for a set of ports, you lose application visibility into those
flows, so you neither know nor control which applications use the ports. Service-based session
timeouts achieve custom timeouts while also maintaining application visibility.
• Apply the best practice Security profile group, which consists of the best practice Security
profiles to allow rules to protect against malware, vulnerabilities, C2 traffic, and known and
unknown threats.
• Log all allowed traffic at session end to track and analyze rule violations. Forward logs to log
servers and when applicable, forward log emails to appropriate administrators.
Order the Data Center Security Policy Rulebase shows you how to order these rules with all of
the other rules we create for the other three data center traffic flows and the block rules so that
no rule shadows another rule.
To apply consistent security policy across multiple data centers, you can reuse templates
and template stacks so that the same policies apply to every data center. The templates
use variables to apply device-specific values such as IP addresses, FQDNs, etc., while
maintaining a global security policy and reducing the number of templates and template
stacks you need to manage.
Allow sanctioned application traffic from vendors, contractors, and customers, restricted to only
the necessary applications.
This rule shows how to secure application traffic arriving at the data center from external
sources by tightly controlling the allowed application(s), allowing them only on the default port,
and blocking sources that you know are bad using an External Dynamic List to identify known
bad IP addresses.
Data Center Best Practice Security Policy Version 10.2 85 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 86 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
center web serves, using only certain applications. To protect the data center web servers,
decrypt traffic so the firewall can inspect it and apply threat prevention profiles.
STEP 2 | Create similar Decryption policy rules for traffic from the internet to any other server group,
if such access is allowed, and for the other applications you allow.
Data Center Best Practice Security Policy Version 10.2 87 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
as a duration during which new connections remain blocked. The CPS thresholds you configure
to protect your data center web servers depends on the capacity of your web servers.
If you don’t use protocols such as UDP or other IP protocols, restrict them using
a combination of Security policy rules to allow applications and Zone Protection
Profiles to block unused protocols by setting flood protection CPS to zero packets for
protocols you want to block.
STEP 2 | Create a classified DoS Protection policy rule to define the servers you want to protect from
a DoS attack and attach the DoS Protection profile to it.
This rule prevents a SYN flood attack from taking down your data center web server tier. This
example applies the classified DoS Protection profile to external traffic allowed to connect to
the web server tier.
Data Center Best Practice Security Policy Version 10.2 88 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Creating separate rules for external and internal attack sources provides separate reporting
that makes investigating attack attempts easier.
Data Center Best Practice Security Policy Version 10.2 89 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Create port- Port-based and IP-based Create strict application-based allow rules
based rules and/ rules can’t control which that allow only data center servers that
or IP-based rules, applications to allow to retrieve updates to use only legitimate
which provide connect to the internet. If a applications to communicate only with
sufficient security
Data Center Best Practice Security Policy Version 10.2 90 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data center Malware or command- Decrypt all traffic from the data center
servers only and-control software to the internet. Create a custom URL
reach out to that is already in the data categories that defines the URLs data
trusted servers center may attempt to center servers are allowed to contact and
such as update communicate with external use it in Security policy to limit internet
servers, so servers to download more access to external servers. Use the same
decrypting that malware or exfiltrate data. custom URL in Decryption policy to
traffic isn’t decrypt traffic to those external servers.
necessary.
Data Center Best Practice Security Policy Version 10.2 91 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
firewalls consider applications without the Sanctioned tag as unsanctioned applications.) A strict
application allow rule set disrupts potential attacks by:
• Preventing malware that is already on a data center server from connecting to a compromised
external server (phoning home) and downloading additional data because the allow rules don’t
allow connections to those servers.
• Preventing attackers from using legitimate applications such as FTP, HTTP, or DNS tunneling
to exfiltrate data or using legitimate applications such as web-browsing on non-standard ports
for command-and-control (C2) operations because the allow rules don’t allow data center
servers to communicate with the internet using those applications. An additional way to help
prevent exfiltration is to use the File Blocking profile’s Direction control to block outbound
update files so you only allow downloading for software update files.
Create a strict allow rule for each application that requires software updates from a different set
of external servers. In many cases, App-ID alone isn’t enough to protect data center servers. For
example, for Linux server updates, it’s not enough to limit traffic to an update application such as
yum or apt-get because that doesn’t prevent connecting to illegitimate servers. The best practice
is to find the URLs that data center servers need to connect to, create custom URL categories
(Objects > Custom Objects > URL Category) that specify the websites to use, and combine them
with App-ID in Security policy rules. The combination of App-ID and custom URL categories locks
down the external servers with which the data center servers can connect by preventing the use
of illegitimate applications and preventing connections to update servers that aren’t in the custom
URL category. For example, in a Security policy rule that allows data center servers to connect to
CentOS update servers, you could create a custom URL category called CentOS-Update-Servers
and add the CentOS update sites your servers use to the custom category.
To find out the URLs of legitimate Linux update servers and other update servers, work
with software engineering, development operations, and other groups that update
software to understand where they go to get updates. You can also log web browsing
sessions, collect the URLs to which developers connect, and then take the URLs to
engineering to filter out the right URLs for the Security policy.
Don’t use the URL Filtering Profile (PAN-DB URL Filtering) in Security policy rules for data
center servers that communicate with the internet because you don’t want to allow all
update servers. Restrict communication so that data center servers only reach out to the
particular servers from which they retrieve updates.
In addition, all allowed communication should occur on the standard ports for each application.
No applications should run on non-standard ports. As with all data center traffic, monitor allow
rule violations because violations indicate either that you need to update the security policy to
allow legitimate traffic or that an adversary is in or is attempting to enter the network.
Order the Data Center Security Policy Rulebase shows you how to order these rules with all of
the other rules we create for the other three data center traffic flows and the block rules so that
no rule shadows another rule.
To apply consistent security policy across multiple data centers, you can reuse templates
and template stacks so that the same policies apply to every data center. The templates
use variables to apply device-specific values such as IP addresses, FQDNs, etc., while
maintaining a global security policy and reducing the number of templates and template
stacks you need to manage.
Data Center Best Practice Security Policy Version 10.2 92 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 93 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Only allow the application(s) to run on the default port to prevent evasive malware from
attempting to use non-standard ports.
• Create a custom URL category to define the URLs of the update servers to which the data
center servers can connect. In this example, the CentOS-Update-Servers custom URL
category defines the update server URLs that the data center servers can reach.
This combination of restrictions also prevents attackers who have already compromised a data
center server from reaching other destinations and using other applications to exfiltrate data
or download additional malware.
Similarly, a rule allowing the same servers to communicate with Microsoft Windows update
servers uses the same construction.
The source zone and address are the same as in the preceding CentOS update rule. The
differences are:
• The custom URL category (Win-Update-Servers) contains the URL for Windows updates so
that contact with other URLs is denied.
• The applications pertain to Microsoft updates. In addition to the ms-update application,
Microsoft updates require the ssl application because ms-update depends on SSL. As with
the CentOS update rule, only standard ports are valid.
Some applications depend on other applications. For a given application, you must allow all
dependent applications or the application won’t work. The user interface shows application
dependencies when you create a Security policy rule. For example, when you specify the
Data Center Best Practice Security Policy Version 10.2 94 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
ms-update application in the rule, the interface shows that ms-update depends on also
allowing SSL:
Click Add to Current Rule to add the selected application(s) to the rule.
You can also use the Search function (Objects > Applications) to find application
dependencies. For example, to find the dependencies for the ms-update application,
search for ms-update, click the ms-update application in the resulting application
list, and then check the Depends on: field.
STEP 2 | Allow data center servers to access DNS and NTP update servers.
This rule shows how to restrict access to DNS and NTP update servers on the internet so that
data center servers communicate only with legitimate, known servers. This example allows IT
data center servers to access DNS and NTP update servers and restricts communication to
Data Center Best Practice Security Policy Version 10.2 95 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
using only the necessary applications to establish connections to only the right set of update
servers.
Allow traffic only to sanctioned DNS servers. Use the DNS Security service to prevent
connections to malicious DNS servers.
STEP 3 | Allow data center servers to access certificate authority servers to obtain the revocation
status of digital certificates and ensure that they are valid.
This rule enables data center servers to connect to an Online Certificate Status Protocol
(OCSP) Responder (server) on the internet to check the revocation status of authentication
certificates. An OCSP Responder provides the most recent certificate status compared to
browser Certificate Revocation List (CRL) updates, which depend on the frequency of CRL
browser updates to keep up with certificate revocations, so the CRL is more likely to be out-
of-date than an OCSP Responder. When you configure a certificate profile on the firewall, you
can set up CRL status verification as a fallback method for OCSP in case the OCSP Responder
is unreachable.
Verify that only the applications you explicitly allowed in the security policy rules are running
by viewing the predefined Applications report (Monitor > Reports > Application Reports >
Data Center Best Practice Security Policy Version 10.2 96 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Applications). If you see unexpected applications in the report, review the application allow rules
and refine them so that they don’t allow the unexpected applications.
The decryption policy rules share some common elements in regard to these traffic flows:
• When you create a Decryption policy rule, the objective is to decrypt traffic so that a Security
policy rule can examine it and allow or block it based on policy. To accomplish that, the
Decryption policy rule must use the same source zone(s) and user(s) as the analogous security
policy rule, and the same destination zone and address (often defined by a dynamic address
group so that as you add or remove servers, you can update the firewall without a commit
operation). Defining the same source and destination in the Security policy and in the
Decryption policy applies both policies to the same traffic.
• The Action for all of these rules is decrypt.
• For each rule, configure decryption logging and log forwarding. Log as much decryption traffic
as your firewall resources permit.
• All of these decryption rules use the Best Practice data center decryption profile shown in
Create the Data Center Best Practice Decryption Profiles.
In many cases, the Decryption policy rule examples include a custom URL category (Objects >
Custom Objects > URL Category) to narrow the scope of traffic to decrypt. Each Decryption
policy rule uses the same custom URL category (and source and destination) as the analogous
Security policy rule so that the Decryption and Security policies apply to exactly the same traffic.
The combination of App-ID and a custom URL category enables the firewall to decrypt only the
traffic the rule allows, which saves processing cycles by not decrypting traffic that the firewall will
block. (Decryption must happen before Security policy rule evaluation.)
Data Center Best Practice Security Policy Version 10.2 97 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
STEP 1 | Decrypt traffic between data center servers and software update servers on the internet.
This rule shows how to decrypt data center server software update traffic to provide visibility
into threats that may be present on internet update servers so the firewall can block them.
This example decrypts allowed traffic between data center servers and CentOS update servers
on the internet based on the analogous application allow rule we created in Create Data-
Center-to-Internet Application Allow Rules.
STEP 2 | Decrypt traffic between data center servers and NTP and DNS update servers on the
internet.
This rule shows how to decrypt data center server NTP and DNS update traffic to provide
visibility into threats that may be present on these internet servers so the firewall can block
Data Center Best Practice Security Policy Version 10.2 98 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
them. This example decrypts allowed traffic based on the analogous application allow rule we
created in Create Data-Center-to-Internet Application Allow Rules.
Data Center Best Practice Security Policy Version 10.2 99 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
For unknown commercial applications, you can submit a request to Palo Alto Networks
to create an App-ID.
If you have existing Application Override policies that you created solely to define custom session
timeouts for a set a of ports, convert the existing Application Override policies to application-
based policies by configuring service-based session timeouts to maintain the custom timeout for
each application and then migrating the rule the an application-based rule. Application Override
policies are port-based. When you use Application Override policies to maintain custom session
timeouts for a set of ports, you lose application visibility into those flows, so you neither know nor
control which applications use the ports. Service-based session timeouts achieve custom timeouts
while also maintaining application visibility.
• Intra-Data-Center Traffic Security Approach
• Create Intra-Data-Center Application Allow Rules
• Create Intra-Data-Center Decryption Policy Rules
Data Center Best Practice Security Policy Version 10.2 100 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
The data center is safe inside Vulnerabilities remain open Install patches on data center
the trusted network, so it’s longer and present attack servers in a timely manner to
not urgent to patch data vectors to attackers. close down vulnerabilities.
center servers quickly. Creating allow list security
policy rules helps you
understand what is running
in your data center and
where unpatched services are
running.
In addition:
• Create a unique service account for each function. For example, allow only specific service
accounts to replicate exchange mailboxes, and allow only specific service accounts on web
servers to query MySQL databases. Don’t use one service account for both functions.
• Monitor service accounts.
• Don’t allow regular user accounts in the data center.
When you transition from port-based to application-based rules, in the rulebase, place the
application-based rule above the port-based rule it will replace. Reset the policy rule hit
counter for both rules. If traffic hits the port-based rule, its policy rule hit count increases.
Tune the application-based rule until no traffic hits the port-based rule for a period of
time, then remove the port-based rule.
Data Center Best Practice Security Policy Version 10.2 101 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
The WildFire security profile identifies unknown malware attempting to spread among
data center servers to prevents the exfiltration of data by discovering malware before it
can do damage. If you can’t use the WildFire global cloud, you can deploy a WildFire
private cloud or a WildFire hybrid cloud.
The example Security policy rules in this section show how to allow traffic for multi-tier data
center finance applications that require using the web server, application server, and database
server tiers to serve the applications. The example includes two proprietary internal applications
for which we created custom applications: Billing-App and Payment-App. Creating custom App-
IDs for these applications enables the firewall to identify them, control them, and apply Security
policy to them. Don’t allow unknown applications in the data center because you can’t identify
and apply security to them, and they may indicate an adversary in your data center. Every data
center application should have an App-ID.
Tag all sanctioned applications with the predefined Sanctioned tag. Panorama and
firewalls consider applications without the Sanctioned tag as unsanctioned applications.
Order the Data Center Security Policy Rulebase shows you how to order these rules with all of
the other rules we create for the other three data center traffic flows and the block rules so that
no rule shadows another rule.
Data Center Best Practice Security Policy Version 10.2 102 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
To apply consistent security policy across multiple data centers, you can reuse templates
and template stacks so that the same policies apply to every data center. The templates
use variables to apply device-specific values such as IP addresses, FQDNs, etc., while
maintaining a global security policy and reducing the number of templates and template
stacks you need to manage.
Data Center Best Practice Security Policy Version 10.2 103 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
STEP 2 | Allow finance application traffic between the applications server tier and the database server
tier.
This rule restricts the traffic that can flow between the application server tier and the database
server tier for the Finance department’s billing servers so that only traffic using legitimate
applications can flow between the billing application servers and the billing database servers.
The rule uses dynamic address groups to specify the servers in each application tier—Billing-
App-Servers specifies the addresses of the servers in the application server tier and DB2-
Servers specifies the addresses of the servers in Finance’s database server tier.
Verify that only the applications you explicitly allowed in the security policy rules are running
by viewing the predefined Applications report (Monitor > Reports > Application Reports >
Applications). If you see unexpected applications in the report, review the application allow rules
and refine them so that they don’t allow the unexpected applications.
Data Center Best Practice Security Policy Version 10.2 104 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
STEP 1 | Decrypt finance application traffic between the web server tier and the application server
tier.
This rule decrypts the traffic flowing between the web server tier and the application server
tier for the Finance department’s billing servers so that the firewall can see the traffic and
protect the servers in each tier against potential threats.
STEP 2 | Decrypt finance application traffic between the application server tier and the database
server tier.
This rule decrypts the traffic flowing between the application server tier and the database
server tier for the Finance department’s billing servers so that the firewall can see the traffic
and protect the servers in each tier against potential threats.
Data Center Best Practice Security Policy Version 10.2 105 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Only the specified users can use only the specified applications on their default ports to access
only the specified data center destination servers (addresses). Security profiles protect all of these
allow rules against threats. These rules precede block rules that discover unknown users and
applications on the network because these rules are very specific and they prevent sanctioned
users and applications from matching more general rules lower in the rulebase.
Rules 8-9: While the preceding rules allow sanctioned applications, the next two rules, created in
Create Data Center Traffic Block Rules, discover and block unexpected applications from users on
standard ports and block all applications on non-standard ports. (Your deployment may have more
user zones than shown in the example.)
Data Center Best Practice Security Policy Version 10.2 106 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Traffic from non-user zones doesn’t match these rules. Place these rules above the application
blocking rules (rules 18 and 19) or those rules will shadow these rules. (Traffic that matches these
two rules may also match the more general application blocking rules. If the application blocking
rules come first and match traffic that also matches these rules, that traffic won’t match these
rules and won’t be logged separately, so the rules won’t do their intended job of differentiating
blocking that is the result of employee user activity from blocking that is the result of activity from
non-user zones.)
Rules 10-16: The next seven rules allow traffic between the data center and the internet and
within the data center (created in Create Internet-to-Data-Center Application Allow Rules, Create
Data-Center-to-Internet Application Allow Rules, and Create Intra-Data-Center Application Allow
Rules.) Security profiles protect all of these allow rules against threats.
Rules 17-20: The last four rules, configured in Create Data Center Traffic Block Rules, block
applications that you know you don’t want in your data center and unexpected applications, and
discover unknown users on your network.
Rule 17 blocks applications you never want in your data center. This rule comes after the
application allow rules to enable access for exceptions. For example, you may sanction one or
Data Center Best Practice Security Policy Version 10.2 107 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
two file sharing applications in application allow rules that precede this block rule, and then
the application filter in this rule blocks the rest of that application type to prevent the use of
unsanctioned file sharing applications. If there are sets of applications or individual applications
that you never want on your network and for which there are no exceptions, for example,
BitTorrent, you can create a specific block rule to block just those applications and place it at
the top of the rulebase, above the application allow rules. However, if you do this, you must be
certain that none of the blocked applications have legitimate business uses because users will not
be able to access them.
Rules 18 and 19 are analogous to rules 8 and 9, which discover unexpected applications from
users (the traffic those rules apply to comes only from user zones). Rules 18 and 19 discover
unexpected applications from all other zones. Having separate rules enables you to log blocking
rule matches with greater granularity.
Rule 20 discovers unknown users so that you can log those attempted accesses separately for
easier investigation.
As with all Security Policy rulebases, the final two rules will be the Palo Alto Networks default
rules for intrazone traffic (allow) and interzone traffic (deny).
Data Center Best Practice Security Policy Version 10.2 108 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
If you use Panorama to manage firewalls, you can monitor firewall health to compare
devices to their baseline performance and to each other to identify deviations from normal
behavior.
Configure log forwarding from firewalls to Panorama or to external services such as an SNMP
Trap server or a syslog server to centralize the logs from multiple firewalls for more convenient
viewing and analysis (a firewall can only display local logs and reports, not logs and reports from
other firewalls). When you configure log forwarding, configure sending notifications to verify that
the log destinations you configure are receiving the firewall logs.
Best practices for data center logging and monitoring include:
• What Data Center Traffic to Log and Monitor
• Monitor Data Center Block Rules and Tune the Rulebase
• Log Data Center Traffic That Matches No Interzone Rules
• Log Intra Data Center Traffic That Matches the Intrazone Allow Rule
Data Center Best Practice Security Policy Version 10.2 109 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
However, the firewall does not forward logs by default and does not apply Security profiles by
default. The preceding example shows the best practice of forwarding logs to the appropriate log
servers and administrators and applying best practice Security profiles.
The best practice for most traffic is to Log at Session End because applications often change
throughout the lifespan of a session. For example, the initial App-ID for a session may be web-
browsing, but after the firewall processes a few packets, the firewall may find a more specific
App-ID for the application and change the App-ID. There are several use cases for logging traffic
at the start of a session, including long-lived tunnel sessions such as GRE tunnels (you can't see
active sessions in the ACC unless you both Log at Session Start and Log at Session End), when
you need information from the start of the session for troubleshooting, and to gain visibility into
Operational Technology/Industrial Control Systems (OT/ICS) sessions, which are also long-lived
sessions.
Logging the traffic records information about traffic that a rule allows and traffic that
a rule denies or drops (rule violations), so the firewall provides valuable information
regardless of how the it treats the traffic. Rule violations highlight potential attacks or
allow rules that need to be adjusted to allow a legitimate business application.
When you examine blocked traffic in logs, differentiate between traffic that the firewall blocked
as a protective event before any systems have been compromised, such as blocking an application
that isn’t allowed, and traffic that the firewall blocked as a post-compromise event, for example,
an attempt by malware that is already on a data center server to contact an external server to
download more malware or exfiltrate data.
The firewall provides a wealth of monitoring tools, logs, and log reports with which to analyze
your network:
• Monitor > Logs provides traffic, threat, User-ID, and many other log types, including Unified
logs, which show multiple log types on one screen so you don’t have to look at different types
of logs separately. When a magnifying glass icon is part of the summary, you can click it to drill
down into the log entry.
• Monitor > PDF Reports provides predefined reports that you can view and the ability to create
report groups composed of predefined and custom reports. For example, you can review traffic
activity or take baseline measurements to understand the bandwidth usage and traffic flow in
each data center segment by zone or interface.
• Monitor > Manage Custom Reports provides the ability to create customized reports so that
you can view information about block rules, allow rules, or any other subject of interest.
• Monitor > Packet Capture enables you to take packet captures of traffic that traverses the
firewall’s management interface and network interfaces.
Data Center Best Practice Security Policy Version 10.2 110 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
• The Application Command Center ( ACC) provides widgets that display an interactive, graphical
summary of the applications, users, URLs, threats, and content traversing the network. For
example, you can review and evaluate the applications on the network ( ACC > Network
Activity > Application Usage > Threats) to see if there are any changes in the application or if
the application exhibits threat behaviors. If you see unexpected applications in the list, evaluate
how to handle those applications.
Another good way to use ACC information is to help identify compromised user accounts and
host systems. Analyze threats along with the usernames associated with the threats using
the ACC > Network Activity > User Activity > Threats widget and then use the threat logs to
isolate the exact issue.
• The Dashboard ( Dashboard) provides widgets that display general firewall information and up
to 10 of the most recent entries in the threat, configuration, and system logs.
• Use Panorama to monitor firewall health and baseline new devices, to compare performance
metrics, and to track firewall performance after an event such as a commit, a software upgrade,
content updates, rule changes, the addition of new applications, etc. If performance deviates
from a device’s baseline, you can view and troubleshoot manually or automatically open a
ticket for investigation.
• On Panorama or on an individual firewall, use the policy rule hit counter to analyze changes to
the rulebase. For example, when you add a new application, before you allow that application’s
traffic on the network, add the allow rule to the rulebase. If traffic hits the rule and increments
the counter, it indicates traffic that matches the rule may already be on the network even
though you haven’t activated the application, or that you need to tune the rule. Another
example is replacing port-based rules with application-based rules by placing the application-
based rule before the port-based rule and noting if any traffic hits the port-based rule. If traffic
hits the port-based rule, then you need to tune the application-based rule to catch that traffic.
In conjunction with the policy rule hit counter, check the ACC > Threat Activity > Applications
Using Non Standard Ports and the ACC > Threat Activity > Rules Allowing Apps On Non
Standard Ports widgets to see if traffic on non-standard ports caused the unexpected rule hits.
The key to using the policy rule hit counter is to reset the counter when you make a
change, such as introducing a new application or changing a rule’s meaning. Resetting
the hit counter ensures that you see the result of the change, not results that include
the change and events that happened before the change.
Data Center Best Practice Security Policy Version 10.2 111 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Follow content update best practices to keep your firewall protection up-to-date.
Maintain the Data Center Best Practice Rulebase includes specific best practices for
data center firewalls.
STEP 1 | Create custom reports to monitor traffic that matches the block rules designed to identify
policy gaps and potential attacks.
1. Select Monitor > Manage Custom Reports.
2. Add a report and give it a Name that describes the report’s purpose, in this example DC
Best Practice Policy Tuning.
3. Set the Database to Traffic Summary. This also changes the Available Columns options.
4. From Available Columns, add Source Zone, Destination Zone, Sessions, Bytes, Application,
Risk of App, Rule, and Threats to the Selected Columns list. If there are other types of
information you want to monitor, select those as well.
5. Select the Scheduled box.
6. Set the desired Time Frame, Sort By, and Group By values. In this example we set the Time
Frame to Last 7 Days, the Sort By to Apps, and the Group By to App Sub Category.
7. Define the query to match traffic hitting the rules designed to find policy gaps and potential
attacks. You can create a single report for traffic that matches any of the rules using the
or operator, or create individual reports to monitor each rule. In the Query Builder, specify
the name of each rule you want to include in the report. This example uses the six blocking
rules and uses the Or operator to include information about traffic that matches any of the
rules:
• (rule eq ‘Discover-Unknown-Users’)
• (rule eq ‘Block-Bad-Apps’)
• (rule eq ‘Unexpected-App-from-User-Zone’)
• (rule eq ‘Unexpected-App-from-Any-Zone’)
• (rule eq ‘Unexpected-User-App-Any-Port’)
• (rule eq ‘Unexpected-App-Any-Port’)
STEP 2 | Review the report (or reports) regularly to make sure you understand why traffic matches
each block rule and either update policy to include legitimate applications and users, or use
the information to assess the risk of traffic that matches the rules.
Data Center Best Practice Security Policy Version 10.2 112 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Log Intra Data Center Traffic That Matches the Intrazone Allow
Rule
By default, all intrazone traffic (source and destination in the same zone) is allowed. After the
firewall evaluates Security policy, it either allows traffic controlled by application allow list rules,
denies traffic controlled by block rules, or if intrazone traffic matches no rules, the firewall allows
it by default. (The firewall blocks interzone traffic by default.) Because of the valuable nature of
data center assets, the best practice is to monitor all traffic inside the data center between data
center servers, including traffic allowed by the intrazone default allow rule.
To gain visibility into this traffic, enable logging on the intrazone-default rule when it applies
to traffic within zones inside the data center. Logging this traffic gives you the opportunity to
examine access that you have not explicitly allowed and which you may want to either explicitly
allow by modifying an allow rule or explicitly block.
In Define the Initial Intra-Data-Center Traffic Security Policy, we used three example zones
inside the data center: Web-Server-Tier-DC, App-Server-Tier-DC, and DB-Server-Tier-DC. In this
example, we create a custom report to gather log information about data center intrazone traffic
in these three internal data center zones.
STEP 1 | Select the intrazone-default row in the rulebase and click Override to enable editing the rule.
STEP 3 | On the Actions tab, select Log at Session End and click OK.
STEP 4 | Create a custom report to monitor traffic that hits this rule for the internal data center zones.
1. Select Monitor > Manage Custom Reports.
2. Add a report and give it a descriptive Name. In this example, the name is Log Intrazone-
Default Rule-DC.
3. Set the Database to Traffic Summary.
4. From Available Columns, add Source Zone, Destination Zone, Sessions, Bytes, Application,
Risk of App, Rule, and Threats to the Selected Columns list. If there are other types of
information you want to monitor, select those as well.
5. Select the Scheduled box.
6. Set the desired Time Frame, Sort By, and Group By values. In this example, the selected
values are Threats and App Category, respectively.
7. Define the query to match traffic that matches the intrazone-default rule for the data
center zones:
The query filters for traffic that matches the intrazone default rule and also matches any of
the three internal data center zones that we defined. Because the default Selected Columns
include zones, the report shows the zone for each session. In a real-world data center, you
Data Center Best Practice Security Policy Version 10.2 113 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
would probably have more zones and you would add each zone to the query. The resulting
custom report settings look like this:
STEP 3 | On the Actions tab, select Log at Session End and click OK.
Data Center Best Practice Security Policy Version 10.2 114 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
STEP 4 | Create a custom report to monitor traffic that hits this rule.
1. Select Monitor > Manage Custom Reports.
2. Add a report and give it a descriptive Name. In this example, the name is Log Interzone-
Default Rule.
3. Set the Database to Traffic Summary.
4. From Available Columns, add Source Zone, Destination Zone, Sessions, Bytes, Application,
Risk of App, Rule, and Threat to the Selected Columns list. If there are other types of
information you want to monitor, select those as well.
5. Select the Scheduled box.
6. Set the desired Time Frame, Sort By, and Group By values. In this example, the selected
values are Last 7 Days, Threats and App Category, respectively.
7. Define the query to match traffic that matches the interzone-default rule:
(rule eq interzone-default)
Data Center Best Practice Security Policy Version 10.2 115 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
STEP 2 | If necessary, modify existing Security policy rules to accommodate the App-ID changes.
You can disable selected App-IDs if some App-IDs require more testing and install the rest
of the new App-IDs. Finish testing any necessary policy revisions before the next monthly
content release with the new App-IDs arrives (third Tuesday of each month) to avoid overlap.
Over time, the list of applications used in the data center usually stabilizes, so fewer
and fewer new App-IDs are relevant. (Most new App-IDs pertain to internet-facing
applications.) This reduces the risk of new App-IDs creating an issue in the data center
and may enable you to install content updates with new App-IDs faster.
STEP 3 | Prepare policy updates to account for App-ID changes included in a content release or to
add new sanctioned applications to or remove applications from your allow rules.
Data Center Best Practice Security Policy Version 10.2 116 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
If you use Panorama to manage firewalls, you can monitor firewall health to compare
devices to their baseline performance and to each other to identify deviations from
normal behavior.
Data Center Best Practice Security Policy Version 10.2 117 ©2023 Palo Alto Networks, Inc.
Data Center Best Practice Security Policy
Data Center Best Practice Security Policy Version 10.2 118 ©2023 Palo Alto Networks, Inc.