{"id":55542,"date":"2017-12-27T05:00:49","date_gmt":"2017-12-27T13:00:49","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=55542"},"modified":"2017-12-21T15:24:17","modified_gmt":"2017-12-21T23:24:17","slug":"tech-docs-stepping-data-center-best-practice-security-policy","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/12\/tech-docs-stepping-data-center-best-practice-security-policy\/","title":{"rendered":"Tech Docs: Stepping Up to a Data Center Best Practice Security Policy"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:19.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-22684 alignnone lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/12\/TechDocs_logo.jpg\" alt=\"tech docs\" width=\"600\" height=\"116\" \/><\/span><\/div><\/p>\n<p>You\u2019ve taken the first step toward securing the valuable assets in your data center network by selecting physical and virtual next-generation firewalls from Palo Alto Networks.<\/p>\n<p>Now how do you take the next step and implement best practices to take advantage of the next-generation firewall\u2019s extensive features and capabilities to best protect your data center from malware, data exfiltration, and other cyberattacks? How do you maintain the trust and confidentiality of partner, customer, and employee data?<\/p>\n<p>Learn about and implement a <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/80\/best-practices\/best-practices-data-center\"><em>Data Center Best Practice Security Policy<\/em><\/a>.<br \/>\n<div style=\"max-width:100%\" data-width=\"316\"><span class=\"ar-custom\" style=\"padding-bottom:129.75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-55584 alignnone lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/12\/Techdocs_1.png\" alt=\"Techdocs_1\" width=\"316\" height=\"410\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Get best practice advice about constructing policy rules that allow only the application traffic you explicitly want to allow in your data center, decrypting traffic, authenticating user access to data center applications and resources, and much more!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-55545 alignleft lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/12\/tech-docs-2.png\" alt=\"tech docs 2\" width=\"600\" height=\"260\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><em>Data Center Best Practice Security Policy<\/em> covers traffic flowing from users to the data center, from the internet to the data center, from the data center to the internet, and between applications and servers inside the data center (east-west traffic). Take a look and find out how to design and implement a data center best practice security policy!<\/p>\n<p><strong>Want more?<br \/>\n<\/strong>As always, you can find our content\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/documentation\">on our Technical Documentation site<\/a>.<\/p>\n<p>Happy reading!<br \/>\nYour friendly Technical Documentation team<\/p>\n<p>Have questions? Contact us at\u00a0<a href=\"mailto:documentation@paloaltonetworks.com\">documentation@paloaltonetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tech docs: stepping up to a data center best practice security policy.<\/p>\n","protected":false},"author":385,"featured_media":55545,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[587],"tags":[12],"coauthors":[3961],"class_list":["post-55542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-documentation","tag-data-center"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/12\/tech-docs-2.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/55542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/385"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=55542"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/55542\/revisions"}],"predecessor-version":[{"id":55638,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/55542\/revisions\/55638"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/55545"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=55542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=55542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=55542"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=55542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}