Under active development Content is continuously updated and improved

Palo Alto Networks

by Palo Alto Networks, Inc.

Next-generation firewall and cloud security platform with advanced threat prevention and zero trust capabilities

Official Docs

Under Construction: This guidance is being actively developed and verified. Content may change.

Authoritative Sources

Key guidance documents from authoritative organizations. Click to view the original source.

Comprehensive security best practices including administrative access, security policy, decryption, DoS protection, zero trust, and Panorama management.

Configuration Examples(7)

·

Security configuration baseline for PAN-OS firewalls. Covers management plane, authentication, logging, threat prevention, and zone protection.

Configuration Examples(2)

·

DoD security requirements for Palo Alto firewalls covering management access, logging, security policies, and threat prevention settings.

Configuration Examples(1)

·

NIST guidance on firewall deployment and policy. Palo Alto App-ID and User-ID provide application-aware security aligned with NIST recommendations.

Configuration Examples(1)

·

NIST SP 800-207 §2: "Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location." §3.1.2: "An enterprise may choose to implement a ZTA based on placing individual or groups of resources on a unique network segment protected by a gateway security component...the enterprise places infrastructure devices such as next generation firewalls (NGFWs) to act as PEPs protecting each resource." Palo Alto NGFWs implement zero trust with User-ID, App-ID, and micro-segmentation capabilities aligned with NIST ZTA tenets.

Configuration Examples(2)

·

SOC 2 CC6.6: "The entity implements logical access security measures to protect against threats from sources outside its system boundaries." Palo Alto NGFWs provide comprehensive boundary protection through App-ID-based traffic inspection, threat prevention profiles, and zone-based security policies that directly implement CC6.6 requirements for external threat protection. Source: AICPA Trust Services Criteria.

ISO 27001:2022 A.8.20: "Networks and network devices shall be secured, managed and controlled to protect information in systems and applications." Palo Alto NGFWs implement comprehensive network security controls including application-aware filtering, intrusion prevention, URL filtering, and encrypted traffic inspection as required by A.8.20. Source: ISO/IEC 27001:2022 Annex A.

CCM IVS-09: "Configure network segmentation to isolate sensitive data and systems." CCM IVS-01: "Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for infrastructure and virtualization security." Palo Alto micro-segmentation capabilities, zone-based policies, and GlobalProtect VPN directly implement CCM IVS controls for network security and segmentation. Source: CSA Cloud Controls Matrix v4.0.

Verification Commands

Commands and queries for testing and verifying security configurations.

Show system info CLI
show system info
Check security policy rules CLI
show running security-policy
View threat logs CLI
show log threat direction equal backward
Check admin sessions CLI
show admins all
View zone protection profiles CLI
show zone-protection zone all
Get config audit diff CLI
show config audit diff
Check GlobalProtect portal status CLI
show global-protect-gateway current-user
View decryption policy CLI
show running ssl-decryption-policy
Check WildFire submissions CLI
show wildfire status
List active sessions by app CLI
show session all filter application web-browsing
Check high availability status CLI
show high-availability all

Related Controls

Security controls from various frameworks that relate to Palo Alto Networks.

Related Technologies