Lesson 4.6 — Firewall evidence, common failures and final A4 answer review

This lesson closes the firewall module by helping the learner review all firewall answers before submission.

What You'll Be Able to Do

By the end of this lesson, you will be able to:

  • perform a final firewall control review
  • check that firewall evidence supports the answers being submitted
  • identify common failure points
  • decide whether the firewall section is ready for Cyber Essentials submission.

Why This Matters

It explains what evidence to collect, what common firewall failures look like, how to check consistency between scope and firewall answers, and how to create a final A4 review record.

The Core Rule

The final firewall review checks whether your A4 answers are complete, consistent and supported by evidence.

Do not submit firewall answers based on assumptions.

Copy This

Keep this rule visible:

Can we confidently explain and evidence how every in-scope network, device group and hosted environment is protected by firewall controls?

Quick Checklist

Before moving on, make sure you can say yes to these:

  • [ ] What is the main question in the final firewall review?
  • [ ] Why must firewall evidence match the scope?
  • [ ] Should firewall passwords be stored in the evidence pack?
  • [ ] What should be checked if remote workers are in scope?
  • [ ] What should be checked if cloud-hosted infrastructure is in scope?

Your Action

Do this now — it takes 10–20 minutes.

Review your firewall evidence. Do you have documented rules, admin accounts, rule justifications, and a review record? Note any gaps.

Key Takeaway

Can we confidently explain and evidence how every in-scope network, device group and hosted environment is protected by firewall controls?

Your Workbook Activity

Complete: Final firewall control review record

Next Lesson

In the next lesson: Secure configuration: removing defaults, unnecessary software and risky settings