3.4 Ensure logging is enabled on all firewall policies

Information

Logging should be enabled for all firewall policies including the default implicit deny policy.

Firewall policies should log for all traffic (both allow and deny policies). This enables SOC or security analyst to do further investigations on security incidents especially on threat hunting or incident response activities. Although there are many data sources that can provide DNS query logs (AD or EDR), this option should be enabled out of best practice and with assumption that no other data sources are available.

Solution

Review firewall policies and ensure that:

-

For allowed policies, "Log Allowed Traffic" is set on "All Sessions" option.

-

For denied policies, "Log Violation Traffic" is enabled.

Impact:

By default, when creating firewall policies, a logging option is not enabled. Also, the default implicit deny policy is not logged. This creates a data gap in threat hunting or incident response activities.

See Also

https://workbench.cisecurity.org/benchmarks/15284

Item Details

Category: AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AU-1, 800-53|AU-2, 800-53|SI-4, 800-53|SI-4(4), CSCv7|12.5, CSCv7|12.8

Plugin: FortiGate

Control ID: bba07ebb50b745f62253f80551dfbab4ddf64179f154059fd2f19a4b134aab6e