Implement and manage a host-based firewall or port-filtering tool on end-user devices, with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed.
All endpoint devices in the organization should be protected by a properly configured software firewall that monitors traffic, accepts compliant traffic, and monitors users.
A firewall protects against malware and attacks that come from inside or outside your organization's network.
All servers in the organization should be protected by a properly configured software firewall that monitors traffic, accepts compliant traffic, and monitors users.
WAF (web application firewall) should be protecting offered digital services from attacks (e.g. SQL injection).
The organisation must have the following firewall rules configured and documented: