Service Groups
A service group is a collection of similar services grouped together to configure security policies, such as a group of services for a specific zone.
The are seven service groups in the list that require configuration before compliance can be accurate. Allowed Services and Service Risk Analysis controls use these service groups and PCI and the Best Practices assessments then use the controls.
Open the Service Groups Page
To open the Services page, on the toolbar, click FireMon Objects > Service Groups.
Service Groups List
The following table defines the values in the Service Groups table. The order listed is ascending by Name, but can be sorted by any column.
Value | Description |
---|---|
Name | The name given to the service group. |
Description | A description of the service group. |
Vulnerability | Description of any inherent risks with allowing the service. |
Default Risk | The level of risk associated with allowing the service. |
![]() |
Action menu with options for tasks to complete at the service group level. |
There are seven service groups that require configuration before compliance can be accurate. Allowed Services and Service Risk Analysis controls use these service groups and PCI and the Best Practices assessments then use the controls.
Value | Description |
---|---|
Allowed (Egress) IP Protocols | The IP protocols that will allow outbound traffic. |
Allowed ICS DMZ IP Protocols | The IP protocols that will allow traffic between the DMZ and corporate networks in process automation systems. |
Allowed ICS (Egress) IP Protocols | The IP protocols that will allow outbound traffic in process automation systems. |
Allowed ICS Internal IP Protocols | The IP protocols that will allow traffic between components in process automation systems. |
Allowed (Ingress) IP Protocols | The IP protocols that will allow inbound traffic. |
Unauthorized (Egress) IP Protocols | The IP protocols that will block unauthorized traffic from leaving the network. |
Unauthorized (Ingress) IP Protocols | The IP protocols that will block unauthorized traffic from entering the network. |