Other issues.
Firewall Auditing and Verification
- How can we be sure that the rules in the firewall are correct?
- How can we be sure that the rules implement our policy?
- How can we detect attacks outside of our firewall?
- How can we detect attacks inside of our firewall?
- How can we verify the firewall has not been compromised?