Security considerations
Risk |
Mitigation |
Considerations |
---|---|---|
Malware |
Antimalware |
Enabled on all user traffic |
Malicious websites |
Web filtering |
Enabled on all HTTP/HTTPS traffic |
Proxy avoidance, botnet and security circumventions |
Application control |
Enabled on all network traffic |
Client-side web attacks |
Intrusion prevention |
Enable IPS signatures for client target on all web traffic |
Unauthorized access |
Role-based access control (RBAC) and Zero Trust Network Access (ZTNA) |
Lock down inbound policies as much as possible Utilize ZTNA or VPN services for remote access |