An organization discovers changes to firewall rules that deviate from documented settings over an extended period. Which practice best addresses these unplanned modifications and ensures device rules align with established guidelines?
Rely on a separate network to handle administrative connections
Maintain a version-controlled baseline and run automated compliance checks
Perform audits of device configurations once a month
Version control combined with automated checks provides continuous tracking of network device parameters and alerts when variations occur. This helps retain an authoritative record of approved configurations. Manual audits on a set schedule overlook changes that take place between checks. Relying on a separate network for administrative traffic does not verify changes within device parameters. Running vulnerability scans on a fixed schedule highlights known weaknesses but does not monitor incremental changes to rules.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is version control in network security?
Open an interactive chat with Bash
How do automated compliance checks work?
Open an interactive chat with Bash
Why are scheduled audits insufficient for monitoring firewall rules?