All Products
Search
Document Center

Cloud Firewall:Policy analysis

Last Updated:Mar 31, 2026

Policy analysis automatically scans your access control policies to identify invalid, redundant, risky, and misconfigured rules—before they become security incidents. Security administrators managing hundreds or thousands of policies can use this feature to detect problems systematically rather than through manual review.

Supported editions

Policy analysis is free for all Cloud Firewall editions. The following table shows the policy limit and covered borders per edition.

EditionPolicy limitCovered borders
Pay-As-You-Go2,000Internet Border, VPC Border, NAT Border, address books
Premium3,000Internet Border, NAT Border, address books
Enterprise5,000Internet Border, VPC Border, NAT Border, address books
Ultimate10,000Internet Border, VPC Border, NAT Border, address books
The Premium Edition does not include VPC Border analysis.

What policy analysis detects

Each check item identifies a specific class of policy problem and the security risk it introduces if left unresolved.

Check itemWhat it findsSecurity risk if unresolved
Policies with no traffic hitsRules that have never matched any trafficUnused rules consume your specification quota and add noise to the policy list, obscuring real coverage gaps
Invalid policies (same source and destination)Rules where source and destination are identicalThese rules can never match real traffic and silently waste quota
Duplicate or redundant policiesRules that fully overlap with higher-priority rulesShadowed rules are never evaluated, creating a false sense of coverage
Business conflict policiesRules that contradict each otherConflicting rules produce unpredictable allow/deny decisions
Default policies not set to deny-allDefault rules that permit traffic instead of blocking itAny traffic not matched by an explicit rule is allowed, expanding your attack surface
Risky policies allowing traffic on high-risk portsRules that permit inbound or outbound access on ports commonly targeted by attackersOpen high-risk ports increase exposure to known attack vectors and lateral movement
Control policies that are too looseOverly broad rules that allow more traffic than necessaryOver-provisioned rules increase the blast radius of a compromise

How specification usage is calculated

The number of specifications consumed by a policy analysis run is:

(Number of access control policies + Number of address books) × Number of check items

The Duplicate, Overlap, or Disperse IP Address Book check item does not support ECS tag-based address books. For example, if you have 10 IP address books and 5 ECS tag-based address books for IPv4, this check item counts 10 × 1 = 10 specifications used.

View specification usage

The Policy Analysis page shows your total policies checked, remaining quota, risks pending action, and a breakdown of risk types by border.

image

Run a policy analysis check

Cloud Firewall checks access control policies for the Internet Border, NAT Border, VPC Border, and address books.

  1. Log on to the Cloud Firewall console.

  2. In the left navigation pane, choose Prevention Configuration > Policy Optimizer.

  3. On the Policy Analysis page, find the check item you want to run and click Check in the Operation column.

    image

  4. In the confirmation dialog box, click OK.

After the check completes, results appear on the Check Item Details page.

Review and resolve check results

  1. Find a completed check item and click Details in the Operation column.

  2. On the Check Item Details page, review the list of non-compliant policies.

    image

  3. For each non-compliant policy, decide whether it is intentional or needs correction:

    • If the policy is intentional, click Ignore. The policy will not be checked again.

    • If the policy needs correction, update it based on the suggestions, then click Handle to mark it as resolved.

What's next