Service Groups

A service group is a collection of similar services grouped together to configure security policies, such as a group of services for a specific zone.

The are seven service groups in the list that require configuration before compliance can be accurate. Allowed Services and Service Risk Analysis controls use these service groups and PCI and the Best Practices assessments then use the controls.

Open the Service Groups Page

To open the Services page, on the toolbar, click FireMon Objects > Service Groups.

Service Groups List

The following table defines the values in the Service Groups table. The order listed is ascending by Name, but can be sorted by any column.

Service Groups List
Value Description
Name The name given to the service group.
Description A description of the service group.
Vulnerability Description of any inherent risks with allowing the service.
Default Risk The level of risk associated with allowing the service.
Action menu with options for tasks to complete at the service group level.

 

There are seven service groups that require configuration before compliance can be accurate. Allowed Services and Service Risk Analysis controls use these service groups and PCI and the Best Practices assessments then use the controls.

Service Groups to Configure Before Use
Value Description
Allowed (Egress) IP Protocols The IP protocols that will allow outbound traffic.
Allowed ICS DMZ IP Protocols The IP protocols that will allow traffic between the DMZ and corporate networks in process automation systems.
Allowed ICS (Egress) IP Protocols The IP protocols that will allow outbound traffic in process automation systems.
Allowed ICS Internal IP Protocols The IP protocols that will allow traffic between components in process automation systems.
Allowed (Ingress) IP Protocols The IP protocols that will allow inbound traffic.
Unauthorized (Egress) IP Protocols The IP protocols that will block unauthorized traffic from leaving the network.
Unauthorized (Ingress) IP Protocols The IP protocols that will block unauthorized traffic from entering the network.