Help Center/ Config/ User Guide/ Resource Compliance/ Built-In Policies/ Cloud Firewall/ CFW Instances Have Protection Policies Attached
Updated on 2025-08-25 GMT+08:00

CFW Instances Have Protection Policies Attached

Rule Details

Table 1 Rule details

Parameter

Description

Rule Name

cfw-policy-not-empty

Identifier

CFW Instances Have Protection Policies Attached

Description

If a CFW instance does not have a protection policy attached, this instance is non-compliant.

Tag

cfw

Trigger Type

Configuration change

Filter Type

cfw.cfw_instance

Rule Parameters

None

Application Scenarios

After protection is enabled, CFW allows all traffic by default. You need to configure appropriate access control policies to manage and control traffic between internal servers and the Internet, prevent internal threats from spreading, and increase the depth of security strategies. For details, see Configuring Protection Rules to Block or Allow Internet Border Traffic. You can configure protection rules in the following scenarios:

  • Protect the traffic of public network assets at the Internet border.
  • Protect the traffic of private network assets at the Internet border.
  • Protect the access traffic between VPCs, or between a VPC and an IDC.

Solution

Configure protection rules for your CFW instances.

Rule Logic

  • If protection rules are configured for a CFW instance, this instance is compliant.
  • If no protection rules are configured for a CFW instance, this policy is non-compliant.