One of the cheapest and easiest ways for an attacker to gain access to your network is through users accessing the internet. By successfully exploiting an endpoint, an attacker can enter your network and move laterally towards the end goal: stealing source code, exfiltrating customer data, or taking down infrastructure. To protect your network from cyberattacks and improve your overall security posture, implement a best practice internet gateway security policy. A best practice policy allows you to safely enable applications, users, and content by controlling all traffic, across all ports, all the time.
Refer to the Palo Alto Networks series of best practices books, which include planning, deployment, and maintenance best practices advice on subjects such as:
Security policy (including Security policy rule construction, rulebase order and hygiene, the App-ID Cloud Engine (ACE), Policy Optimizer, SaaS Policy Recommendation, and IoT Policy Recommendation)