Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Cyber Essentials Section 1 - Firewalls and Internet Gateways

by Josef Weiss
September 18, 2025

Cyber Essentials Section 1 - Firewalls and Internet Gateways

The Cyber Essentials is a UK government-backed framework which is designed to assist organisations in protecting themselves against common threats.  The Cyber Essentials provides a basic cyber security foundation that can serve as a stepping stone to a more comprehensive zero-trust approach. The Cyber Essentials is built on 5 key components that, when implemented correctly, can reduce cyber risk.  The five key components are:

 

  1. Firewalls and Boundary Devices
  2. Secure Configurations
  3. Access Control
  4. Malware Protection
  5. Patch Management

 

Tenable has released a series of reports, that focuses on each of the five basic technical controls, which organisations can use to help strengthen their defences against the most common cyber threats.

 

The focus of this report is Section 1 - Firewalls and Internet Gateways.  Key components of this section apply to all the following in scope devices: Boundary Firewalls, Desktop Computers, Laptops, Routers, Servers, Iaas, PaaS, and SaaS devices.  Devices must be secure and only necessary network services should be able to be accessed from the Internet. The objective of this key component is the control of inbound/outbound traffic.

 

This requirement applies to every in scope device, and can be achieved using Boundary Firewalls to restrict inbound or outbound traffic, a software firewall which is installed and configured on each end point device, or for cloud services, data flow policies. Most end point devices, such as desktops and laptops come with software firewalls pre-installed, and the Cyber Essentials recommends that these services be enabled.  Essentially, every in scope device must be protected by either a properly configured firewall, or a network device with firewall functionality. 

 

This report contains the following chapters:

 

  • Firewalls and Internet Gateways - This section displays information related to the identification of Firewalls and Internet Gateways, 

  • Firewall Compliance Details - This section displays information regarding firewall compliance checks, and firewall rule enumeration for a number of firewall audits.

  • Port Details - This section presents details on port summaries for all active and well known ports.

  • Services Details - This section provides details on running services.

× Contact our sales team