Why do we need security rules?
In the previous chapters, we learned how we can establish different ways to connect to Prisma Access, the internet, service connections, and other security-processing nodes. To ensure access is controlled, we need to create security rules that match every scenario of access that is required. In general, there will be two large sets of access: access to the internet and access to internal resources or private applications.
As a rule of thumb, in Prisma Access, security rules are applied only to Inbound connections. This means that security rules are configured so the user or remote office is always the source of outbound connections. The only exception is when we create embargo rules (more about that later in this chapter), where we block certain countries from connecting to our infrastructure.
Policies are applied in the following way:
- Enforced: From mobile users or remote networks to the internet.
- Enforced: From mobile users or remote...