Secure/Protect - Firewall
Monitor and control incoming and outgoing network traffic based on predetermined security rules. Such solutions may be host-based, or network-based, and serve as a gatekeeper between trusted internal networks and untrusted external networks, effectively managing and filtering network communications to prevent unauthorized access and protect against cyber threats. Such solutions help organisations to meet a subset of the requirements in the "Secure/Protect" category of CSA Cyber Essentials.
Please review all requirements. Your solution must meet all 🔴 mandatory requirements to qualify.
2.01🔴
Does your firewall solution support the protection of network, systems, and endpoints such as laptops, desktops, servers, and virtual environments, providing protection with configuration to analyse and accept only authorised network traffic into the organisation’s network? Please indicate if the firewall solution is a: -Host-based firewall, or -Network perimeter firewall.
2.02
Has your solution undergone cybersecurity product certification? Please list all relevant cybersecurity certification applicable. (e.g. Common Criteria (CC) or similar)
2.03🔴
[For solution vendor] Does your company provide the following professional services: - Installation and configuration - Documentation of key deployment information of the solution and briefing for solution handover to customer
Last updated