Overview
Direct Answer
A firewall is a network security system that enforces access control policies by examining data packets and blocking or allowing traffic based on predefined rules. It serves as a barrier between trusted internal networks and untrusted external networks, forming the first line of defence against unauthorised access.
How It Works
Firewalls inspect network traffic at various OSI layers—packet filters operate at Layer 3 (IP), stateful firewalls track connection states at Layer 4 (TCP/UDP), and application firewalls analyse Layer 7 payloads. Rules are evaluated sequentially; traffic matching deny rules is dropped, whilst permitted traffic is forwarded to its destination.
Why It Matters
Organisations depend on firewalls to enforce security policies, reduce attack surface, and meet compliance requirements such as PCI-DSS and HIPAA. They prevent unauthorised network access, contain lateral movement during breaches, and provide visibility into traffic patterns—critical for risk management and incident response.
Common Applications
Firewalls protect corporate perimeter networks, data centre infrastructure, cloud environments, and remote access gateways. Specific deployments include host-based firewalls on endpoints, network-based firewalls at organisational boundaries, and embedded firewalls in routers and switches.
Key Considerations
Firewalls cannot stop threats already inside the network perimeter and may create performance bottlenecks if misconfigured. Effective deployment requires ongoing rule maintenance, monitoring, and integration with other security controls rather than reliance as a standalone defence.
Cited Across coldai.org1 page mentions Firewall
Industry pages, services, technologies, capabilities, case studies and insights on coldai.org that reference Firewall — providing applied context for how the concept is used in client engagements.
Referenced By2 terms mention Firewall
Other entries in the wiki whose definition references Firewall — useful for understanding how this concept connects across Cybersecurity and adjacent domains.
More in Cybersecurity
Cyber Insurance
Security GovernanceInsurance coverage protecting organisations against financial losses from cyberattacks, data breaches, and related incidents.
Blue Team
Offensive SecurityA group of security professionals who defend against both real attackers and simulated attacks from red teams.
Spear Phishing
Offensive SecurityA targeted phishing attack directed at specific individuals or organisations using personalised deceptive content.
Extended Detection and Response
Offensive SecurityA unified security platform that integrates multiple security tools and data sources for comprehensive threat detection.
Red Team
Offensive SecurityA group of security professionals who simulate real-world attacks to test an organisation's defensive capabilities.
Security Audit
Security GovernanceA systematic evaluation of an organisation's information system security by measuring compliance with established criteria.
Attack Surface
Offensive SecurityThe total number of points where an unauthorised user can try to enter or extract data from a system.
Phishing-Resistant Authentication
Identity & AccessAuthentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.