Firewall rule configurations

Identifies firewall rule configurations patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems.

Type
regex
Engine
boost_regex
Confidence
medium
Confidence justification
structural regex with domain-specific anchors and constrained context replaces phrase-only marker.
Detection quality
Mixed
Jurisdictions
au
Regulations
NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth)
Frameworks
CIS Controls, DISP, ISO 27001, NIST CSF, PCI-DSS, SOC 2
Data categories
credentials, security
Scope
wide
Platform compatibility
Purview: Compatible, GCP DLP: Compatible, Macie: Compatible, Zscaler: Compatible, Palo Alto: Degraded, Netskope: Unsupported

Pattern

(?is)\b(?:firewall\s+rule\s+configurations|security\s+group|access\s+control\s+list|allow\s+rule|deny\s+rule|inbound\s+rule|outbound\s+rule|network\s+policy|port\s+filtering|ip\s+tables)\b

Corroborative evidence keywords

firewall rule configurations, firewall, rule, configurations, security, operations, threat, data

Proximity: 300 characters

Should match

Should not match

Known false positives

References