Glossary Term

Firewall

Network or host-based filtering that enforces traffic policies and reduces exposure.

1 min read

Share this definition

Post it to your feed or send it to teammates.

What it is

A firewall is a security control that monitors and filters network traffic based on defined policies. Traditional firewalls inspect packet headers to allow or block connections between zones such as the internet and internal networks. Next-generation firewalls add deep packet inspection, application awareness, intrusion prevention, and even sandboxing to analyze payloads and user identities. Firewalls can be physical appliances, software running on servers, cloud-native services, or host-based agents. They enforce segmentation by creating trust boundaries, limiting which systems can communicate, and applying granular policies per application. Modern architectures extend firewall concepts into zero trust network access, microsegmentation, and cloud security groups. However, firewalls are only as effective as the policies governing them; poorly maintained rule sets accumulate exceptions, shadow rules, and misconfigurations that open gaps attackers can exploit. Ongoing governance, logging, and automation are necessary to keep firewall defenses aligned with changing infrastructure and business requirements.

Why it matters

Firewalls remain a foundational layer of defense, preventing opportunistic scans, blocking known malicious IP addresses, and containing lateral movement during an incident. They also help demonstrate compliance with industry regulations that mandate network segmentation and monitoring.

How to reduce risk

  • Design network zones around business functions and strictly limit cross-zone communication to necessary services.
  • Regularly review firewall rules for redundancy, permissive any-any statements, and expired temporary exceptions.
  • Enable logging, integrate with a SIEM, and monitor for anomalous traffic patterns or policy violations.
  • Combine firewalls with zero trust access controls, endpoint protection, and secure configuration management.