Department For Education
The importance of meeting the standard
Properly configured firewalls prevent many attacks. They also make scanning for suitable hacking targets much harder.
How to meet the standard
Ask your IT service provider to set up your devices to meet the standards described in the technical requirements.
Agree with your IT service provider a system for monitoring logs and documenting decisions made on inbound traffic.
Your IT service provider may be a staff technician or an external service provider.
Remember that this standard may change over time with changing cyber threats.
You are free to choose any suitable firewall.
Technical requirements to meet the standard
To meet this standard you must:
- protect every device with a correctly configured boundary, or software firewall, or a device that performs the same function
- change the default administrator password, or disable remote access on each firewall
- protect access to the firewalls administrative interface with multi-factor authentication (MFA), or a small specified IP-allow list combined with a managed password, or prevent access from the internet entirely
- keep firewall firmware up to date
- check monitoring logs as they can be useful in detecting suspicious activity
- block inbound unauthenticated connections by default
- document reasons why particular inbound traffic has been permitted through the firewall
- review reasons why particular inbound traffic has been permitted through the firewall often, change the rules when access is no longer needed
- enable a software firewall for devices used on untrusted networks, like public wi-fi
Dependencies to the standard
See our broadband internet standards.
When to meet the standard
You should already be meeting this standard for the security of your networks. If you are not already meeting this standard you should make it a priority to review each device in your network.