Chapter 11: Building Your First Policy
We have learned a lot over the course of the previous chapters. Now, it’s time to put that knowledge to the test and construct our first fully functional access control policy.
We’ll be following the process of defining a policy structure, trying to account for the most common scenarios likely to be encountered in any infrastructure. Once that is done, we’ll proceed with the creation of the rules and, when necessary, additional objects. As we progress, we’ll be periodically testing the behavior of our policy to ascertain that it is performing as intended.
Additionally, we will gradually expand its capabilities with HTTPS Inspection, application control, URL filtering, and Identity Awareness to experience and gain an understanding of most aspects of policy building.
In this chapter, we are going to cover the following main topics:
- Defining the access control policy structure
- Creating rules for the...