Precursor Security
CREST-Accredited | Rulebase Audit & Hardening

Firewall Configuration Review

Firewall rulebases accumulate years of emergency rules, forgotten test policies, and inherited configuration debt. We conduct an independent rulebase review (ANY/ANY rules, shadowed policies, unfiltered egress, management plane hardening) and return a remediation-ready report your team can action within a week.

CREST-Accredited Assessment
Offline Review, No Live Firewall Access Required
PCI DSS Requirement 1.1.7 Audit-Ready Report
Palo Alto, Fortinet, Cisco ASA & Checkpoint
Scroll
Vendor Self-Assessment vs Expert Review

Beyond Automated Rule Checking

Vendor Self-Assessment

Vendor Tooling

  • Checks compliance, not security context
  • No adversarial perspective on rule logic
  • Cross-vendor environments not covered
  • No shadowed or redundant rule analysis
  • Not accepted as independent audit evidence
Expert Assessment

CREST-Accredited Review

  • Industry standard benchmark + PCI DSS Req 1 assessment
  • Adversarial rulebase logic analysis
  • Shadowed and redundant rule detection
  • Cross-vendor unified methodology
  • Vendor CLI remediation commands
When to Commission

When to Commission a Firewall Review

Most firewall configuration reviews are triggered by a specific compliance deadline, audit finding, or change in ownership. If any of these scenarios describe your situation, this review provides the evidence you need.

PCI DSS Requirement 1.1.7

PCI DSS Requirement 1.1.7 mandates an independent review of firewall and router rule sets at least every six months. Internal team reviews do not satisfy the independence requirement. Our report provides the documented evidence your QSA needs.

ISO 27001 Surveillance Audit

ISO 27001 Annex A.8.22 (Network Security) and A.8.20 require documented network security controls including regular review of firewall configuration. Our report provides the technical evidence artefact for your surveillance visit.

Pen Test Finding Follow-Up

A penetration test flagged "firewall misconfiguration" without specifying which of the 200+ controls to prioritise. Our review provides the structured remediation path mapped to industry standard benchmarks that the pen test report could not.

Post-Incident Review

A breach investigation found lateral movement through firewall zones that should have been segmented. You need independent verification that the rulebase is enforcing the network architecture your diagrams describe.

Inherited Infrastructure

You have inherited a firewall estate from a predecessor team, an acquisition, or an outsourced provider. The rulebase contains years of accumulated rules nobody can fully account for, and you need a baseline assessment before assuming responsibility.

Cyber Essentials Plus

Cyber Essentials Plus technical audit requires verification of boundary firewall controls. Our configuration review produces findings in a format that maps directly to the Cyber Essentials boundary firewall requirement.

Risk Intelligence

The Rulebase Exposure

Critical
87%

RULEBASES WITH ANY/ANY

Overly permissive rules allowing unrestricted traffic are present in the majority of enterprise rulebases we review. Often left from incident response, change-freeze workarounds, or vendor deployment templates that were never tightened.

High
6mo

PCI DSS REVIEW CYCLE

PCI DSS Requirement 1.1.7 mandates independent firewall rule review at least every six months. Internal team reviews do not satisfy the independence requirement. Lapsed assessments are a common QSA escalation point.

Delivery
£2.5k

STARTING FROM

Single-device firewall configuration review including rulebase analysis, industry standard benchmark assessment, device hardening check, and remediation guidance. Fixed-price quote after scoping.

Mapped
Controls
PCI DSSRequirement 1.1.7
ISO 27001Annex A.8.22
Cyber EssentialsBoundary Firewalls
NIST 800-41Firewall Policy
Common Findings

What We Typically Find

Across every firewall estate we review, certain misconfiguration patterns appear repeatedly. These are not theoretical risks. They are findings our consultants document in reports issued to UK organisations every month.

Critical
Rulebase

ANY/ANY rule permits all traffic from guest VLAN to production

An overly permissive firewall rule allows unrestricted traffic from the guest wireless VLAN to the production server subnet. Any device connecting to the guest network can reach databases, file shares, and internal applications without restriction.

CVSS 9.1NIST AC-4
Business ImpactUnrestricted lateral movement from guest network to production systems
Critical
Management

Management interface accessible via Telnet from internal zone

The firewall management interface accepts Telnet connections on port 23 from the internal network. Telnet transmits credentials in plaintext, allowing any attacker with network access to intercept administrative login sessions via packet capture.

CVSS 8.8NIST IA-7
Business ImpactCredential interception via plaintext management sessions
Critical
Egress

Unrestricted outbound permits C2 channels and data exfiltration

No egress filtering is configured on the firewall. Any internal host can connect outbound on any port to any destination. An attacker who compromises a single workstation can establish command-and-control channels and exfiltrate data without triggering any firewall alert.

CVSS 8.5NIST SC-7
Business ImpactC2 channels and data exfiltration via unrestricted outbound traffic
Critical
Credentials

Default SNMP community string on management interface

The SNMP service is running with the factory-default community string. An attacker can read the full device configuration, including ACLs, routing tables, and interface details, using standard SNMP tools from any host on the management VLAN.

CVSS 8.2NIST IA-3
Business ImpactFull device configuration disclosure and potential reconfiguration
High
Rulebase

14 shadowed rules in outbound policy mask real access scope

Fourteen rules in the outbound policy are unreachable because broader rules above them intercept all matching traffic first. These shadowed rules create false confidence in compliance reviews: the rulebase appears to have restrictive controls that are never actually enforced.

CVSS 7.5PCI DSS 1.1.7
Business ImpactFalse compliance confidence masking actual network exposure
High
Firmware

Firmware 3 versions behind with known RCE CVEs

The firewall operating system is three major versions behind the current release. Known remote code execution CVEs exist with publicly available exploit code. Firmware patching is the only remediation path for these vulnerabilities.

CVSS 7.8NIST SI-2
Business ImpactExploitable RCE vulnerabilities with publicly available exploit code

Most enterprise firewalls we review have at least two Critical and five or more High findings on first independent assessment.

Platform Coverage

Firewalls We Assess

Each platform is assessed against the applicable industry standard hardening benchmark. Our assessors have hands-on experience with each vendor's management interface, not generic methodology applied to unknown platforms.

Palo Alto Networks

Versions

PAN-OS 10.x, 11.x, Panorama

Security Benchmark

Industry Standard Firewall Hardening Benchmark

Fortinet FortiGate

Versions

FortiOS 7.0, 7.2, 7.4, VDOM

Security Benchmark

Industry Standard Hardening + FortiGuard Advisories

Cisco ASA / Firepower

Versions

ASA 9.x, FTD 7.x, FMC

Security Benchmark

Industry Standard Hardening + PSIRT Advisories

Checkpoint

Versions

R80.40, R81.x, SmartConsole

Security Benchmark

Industry Standard Firewall Hardening Benchmark

Juniper SRX

Versions

Junos 21.x, 22.x, 23.x

Security Benchmark

Industry Standard Hardening + Security Advisories

Rulebase Analysis Methodology

What We Audit

Firewall rulebases accumulate technical debt across every change request and every incident workaround. We map the full rulebase, including rules that have never been hit, rules that are unreachable due to broader policies above them, and rules that were added for one-off access and never removed, and risk-rate every finding against industry standard security benchmark controls and PCI DSS Requirement 1.

Rulebase Logic

Promiscuous Rules

We identify ANY/ANY rules, wildcard service groups, and overly permissive policies across your rulebase, including Palo Alto App-ID wildcard rules, FortiGate policies with ALL source/destination, and Cisco ASA permit ip any any access-lists. Each finding is mapped to the downstream assets reachable under that rule.

Shadow Analysis

Shadowed Rules

We map rulebase logic to identify shadowed policies: rules that are never evaluated because a broader rule above them intercepts the traffic first. Shadowed rules mask real exposure: an apparently restrictive rule below an ANY/ANY policy provides no security protection, but creates false confidence in compliance reviews.

Egress Controls

Outbound Filtering

We verify whether egress filtering is enforced. Unrestricted outbound traffic allows successful C2 channels and data exfiltration from an already-compromised host. We test for DNS tunnelling, HTTPS covert channels, and direct-to-IP outbound connections that bypass proxy controls.

Device Security

Device Hardening

We audit the appliance itself: default credentials, weak SNMP community strings, unpatched firmware CVEs, and insecure administrative access. Legacy management interfaces such as Telnet and HTTP are flagged for immediate remediation.

Inspection

Decryption & Inspection

We review SSL/TLS inspection policies to identify traffic that bypasses deep packet inspection. Encrypted traffic without inspection creates blind spots that malware, C2 channels, and data exfiltration exploit. We assess decryption certificate trust chains and policy exclusion lists.

Architecture

Zone Architecture

We review the inter-zone policy matrix against least-privilege design: which zones can communicate, under what rules, and whether the architecture enforces proper segmentation between untrusted, DMZ, internal, and management zones. Flat zone architectures with implicit trust are flagged.

Engagement Pipeline

Firewall Audit Workflow

From configuration export to a compliance-ready report. A safe, offline assessment lifecycle with no live firewall access required.

Step 01

Configuration Export

You export the device configuration (no live access to the firewall required). We provide vendor-specific export instructions on engagement confirmation: Palo Alto XML snapshot, FortiGate full-config backup, Cisco ASA running-config, Checkpoint policy export. Transfer is via our encrypted client portal.

Step 02

Automated Analysis

We use algorithmic tools to parse thousands of lines of ACLs, mapping the effective rulebase and identifying logical contradictions, duplicate rules, and never-hit policies.

Step 03

Manual Logic Check

Algorithms miss context. We manually review the business justification for high-risk rules to ensure they align with least-privilege principles and do not expose critical assets under combinations the automated pass did not evaluate.

Step 04

Remediation Guide

We deliver a risk-rated findings report (Critical, High, Medium, Low) with specific remediation steps for each finding, vendor CLI examples where applicable, and a compliance mapping to PCI DSS Requirement 1, industry standard benchmark controls, and ISO 27001 Annex A.8.22.

Deliverables

What You Receive

Every firewall configuration review includes the following deliverables, formatted for both technical remediation teams and non-technical stakeholders.

Executive summary written for board, CISO, and QSA presentation
Full findings register with each issue rated Critical, High, Medium, or Low
Industry standard benchmark control mapping for every non-compliant configuration
Vendor-specific CLI remediation commands per finding
PCI DSS Requirement 1 compliance mapping table
ISO 27001 Annex A.8.22 and Cyber Essentials Plus evidence artefact
Compliance attestation statement suitable for QSA submission
Retesting within the assessment window to confirm remediated findings at no additional cost

Reports are delivered via our real-time penetration testing portal with role-based access. Also available in PDF and DOCX formats.

After Testing

Detect Configuration Drift in Real Time.

A configuration review is a point-in-time assessment. Rules change between reviews: emergency access gets granted, exceptions get added, and the rulebase drifts from its audited state. Feed assessment findings directly into detection rules that alert on configuration changes, anomalous rule hits, and active exploitation attempts.

Discuss Your Requirements
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

Firewall configuration review pricing typically ranges from £2,500 to £8,000 or more depending on environment complexity and number of devices. Single firewall reviews (Palo Alto, Fortinet, Cisco ASA) average £2,500-£4,000 including rulebase analysis, industry standard benchmark assessment, and remediation guidance. Multi-device reviews (2-5 firewalls, HA pairs, or complex zone architectures) typically cost £4,000-£6,000. Enterprise reviews (5 or more devices, multiple vendors, complex routing) typically cost £6,000-£8,000 or more. Pricing includes PCI DSS Requirement 1.1.7 compliant reporting. We provide fixed quotes after understanding your device inventory and architecture complexity.

Vendor tools check technical compliance but miss security context: (1) Vendor tools cannot assess business justification for rules. ANY/ANY rules may be technically valid but security-inappropriate. (2) Cross-vendor environments require a unified assessment methodology that vendor tools do not provide, (3) Shadowed and redundant rules require logical analysis beyond automated compliance checking, (4) External reviewers bring an adversarial perspective identifying how attackers would exploit misconfigurations, (5) PCI DSS and compliance frameworks require independent third-party review, not vendor self-assessment, and (6) Legacy rules accumulated over years need human review to identify technical debt. External review provides the security expertise vendor tooling cannot deliver.

No. We conduct offline configuration reviews. You export the device configuration and transfer it to us via our encrypted client portal or PGP-encrypted email. You can sanitise the export before transfer (removing pre-shared keys and SNMP community strings) without affecting our analysis. We sign a data processing agreement (DPA) on request. The assessment is conducted entirely on the exported configuration, with no connection to your live environment at any point.

We support all major enterprise firewalls: - Palo Alto Networks (PAN-OS, Panorama-managed) - Fortinet FortiGate (all FortiOS versions, VDOM environments) - Cisco ASA and Firepower / FTD - Checkpoint (SmartConsole, VSX, ClusterXL) - Juniper SRX - WatchGuard We provide vendor-specific export instructions for each platform on engagement confirmation.

Yes. PCI DSS Requirement 1.1.7 requires an independent review of firewall and router rule sets at least every six months. Internal reviews conducted by the organisation's own network team do not satisfy the independence requirement. Our assessment report includes a findings register, risk ratings, remediation steps mapped to PCI DSS Requirement 1 controls, and a compliance attestation statement suitable for submission to your QSA as supporting evidence in your Report on Compliance (RoC) or Self-Assessment Questionnaire (SAQ D).

A single-device review (Palo Alto, FortiGate, Cisco ASA, or Checkpoint) completes within 3-5 business days of receiving the configuration export. Multi-device reviews (2-5 firewalls, HA pairs) complete within 5-7 business days. Enterprise reviews (5 or more devices, multi-vendor) are scoped individually and typically complete within 10-15 business days. All timelines are from configuration receipt, not engagement signature. We begin analysis as soon as files are received.

The report includes: an executive summary suitable for board or QSA presentation; a full findings register with every identified issue risk-rated Critical, High, Medium, or Low; per-finding remediation steps with vendor CLI examples where applicable; a compliance mapping table covering PCI DSS Requirement 1, industry standard benchmark controls, and ISO 27001 Annex A.8.22; and a compliance attestation statement for QSA submission. Reports are delivered in PDF format within 3-5 business days of configuration export receipt for single-device reviews.

Yes. We cross-reference your OS version against the vendor's known vulnerability database (CVEs) to identify unpatched exploits. Firmware CVEs are included in the findings register with a risk rating and vendor remediation reference.