3.6.2 Ensure default deny firewall policy (Scored)
Profile Applicability
Level 1 - Server Level 1 - Workstation
Description
A default deny all policy on connections ensures that any unconfigured network usage will be rejected.
Rationale
With a default accept policy the firewall will accept any packet that is not configured to be denied. It is easier to white list acceptable usage than to black list unacceptable usage.
Audit
Run the following command and verify that the policy for the INPUT, OUTPUT, and FORWARD chains is DROP or REJECT:
# iptables -L Chain INPUT (policy DROP) Chain FORWARD (policy DROP) Chain OUTPUT (policy DROP)
Remediation
Run the following commands to implement a default DROP policy:
# iptables -P INPUT DROP # iptables -P OUTPUT DROP # iptables -P FORWARD DROP
Notes
Changing firewall settings while connected over network can result in being locked out of the system.
Remediation will only affect the active system firewall, be sure to configure the default policy in your firewall management to apply on boot as well.