3.3 Ensure firewall policy denying all traffic to/from Tor, malicious server, or scanner IP addresses using ISDB

Information

Firewall policies should include a deny rule for traffic going to/from Tor, malicious server, or scanner IP addresses using ISDB (Internet Service Database).

Rationale:

FortiGate includes Tor or malicious server related IP address using ISDB. The idea is to filter out malicious traffic using firewall policies as first level filtering. This is done without involving more resource intensive processes such as IPS inspection, hence optimizing FortiGate's performance.

Solution

Review firewall policies and ensure there are:

A firewall policy created to block inbound connections with these settings:

From: Any
To: Any
Source: 'Tor-Exit.Node', 'Tor-Relay.Node', 'Censys-Scanner', 'Shodan-Scanner', and 'Malicious-Malicious.Server'
Destination: all
Schedule: Always
Services: All
Action: Deny
Log Violation Traffic: Enabled
Enable this policy: Enabled



A firewall policy created to block outbound connections with these settings:

From: Any
To: Any
Source: All
Destination: 'Tor-Relay.Node' and 'Malicious-Malicious.Server'
Schedule: Always
Action: Deny
Log Violation Traffic: Enabled
Enable this policy: Enabled

See Also

https://workbench.cisecurity.org/benchmarks/12961

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-18, 800-53|AC-18(1), 800-53|AC-18(3), 800-53|CM-2, 800-53|CM-6, 800-53|CM-7, 800-53|CM-7(1), 800-53|CM-9, 800-53|CP-6, 800-53|CP-7, 800-53|PL-8, 800-53|PM-7, 800-53|SA-8, 800-53|SC-7, CSCv7|12.2, CSCv7|12.3, CSCv7|13.3

Plugin: FortiGate

Control ID: 25654741cae11f34bcc3d8b4d769558099ecc4ddb82c37d93e3772966ae95aec