All hardware that is plugged into a network is subject to attack by hackers. In addition to hardware firewalls that may be in place, every piece of hardware should be protected by a software firewall. This is especially important for forward deployed computers that may not have an external firewalls on the local network. Personal firewalls continuously monitor the activity on the local computer network interface and detect possible hostile attacks. The user has the discretion to block hostile attacks permanently or for a particular occasion. Since this problem is not restricted to DoD assets, commercial off-the-shelf (COTS) products are continuously updated to meet the latest threats and are essential in meeting these threats.
Do all the hardware devices listed in the Node acquisition list have COTS software firewall licensed software?
Review the Node acquisition list and make sure there is one license for each piece of computer hardware.
Do all hardware devises listed in the Node acquisition list have COTS firewall software installed and is it enabled?
Review the prerequisites in the installation manual for firewall software.