Webinar: Transform Customers Into Your Most Powerful Marketing Asset
Webinar: How automation can transform the way you manage your network security policy final
-
Upload
algosec -
Category
Technology
-
view
35 -
download
0
Transcript of Webinar: How automation can transform the way you manage your network security policy final
![Page 1: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/1.jpg)
Network Security Policy ManagementAutomation for Transformation
Yonatan Klein, Director Product Management
![Page 2: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/2.jpg)
WHAT WE’LL COVER TODAY
Managing Network Connectivity throughout the application lifecycle
Managing Disaster Recovery – automatically and securely
01
02
03
Mapping rules and flows to business processes and applications
Making rule recertification an efficient, application-centric process04
Summary and Q&A05
2
![Page 3: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/3.jpg)
WHAT IS NETWORK SECURITY POLICY MANAGEMENT
3 | Confidential
![Page 4: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/4.jpg)
4 | Confidential
GETTING STARTED WITH NETWORK SECURITY POLICY MANAGEMENT:Map applications and connectivity needs
![Page 5: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/5.jpg)
MAP YOUR DATA-CENTER ASSETS: GETTING A SINGLE SOURCE OF TRUTH
• CMDB?
• Excel Spreadsheet?
• Firewall Rules?
5 | Confidential
![Page 6: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/6.jpg)
APPLICATION & CONNECTIVITY AUTO-DISCOVERY
6 | Confidential
• Various sources: network mirroring, PCAP files, NetFlow, sFlowNetwork sensing
• Determine hosts• Determine active flows
Analyze network traffic
• Smart heuristics to identify web services, data bases, applications• Application identity “hints”
Identify business applications
![Page 7: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/7.jpg)
THE MAPPED BUSINESS APPLICATIONS
7 | Confidential
![Page 8: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/8.jpg)
DISCOVERED APPLICATIONS
8 | Confidential
![Page 9: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/9.jpg)
DISCOVERED APPLICATION FLOWS
9 | Confidential
![Page 10: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/10.jpg)
OPTIMIZED FLOWS
10 | Confidential
![Page 11: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/11.jpg)
APPLICATION AND CONNECTIVITY DISCOVERY
Manual Process
Reliable, complete single source of truth?
Otherwise manual process to identify each host and flow
Manage information in excel ?
With Automation
Flows identified automatically
Heuristics and hints help identify matching applications
Integrated into Algosec BusinessFlow
AlgoSec BusinessFlow manages application information and corresponding flows and network rules
11 | Confidential
Connectivity needs identified, optimized
![Page 12: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/12.jpg)
12 | Confidential
APPLICATION MIGRATION - AUTOMATED
![Page 13: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/13.jpg)
APPLICATION MIGRATION
Data center migration
13 | Confidential
App migration to the public cloud
App migration between data centers
Consolidation due to M&A
Application lifecycle: Test -> Pre-Production -> Production
![Page 14: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/14.jpg)
Which Application Migration Projects Are You Undertaking In Your Organization?
• Data Center Migration • Application Migrations To The Public Cloud• Application Migrations Between Data Centers• Application Life-cycle (e.g. Dev/Test->Pre-Prod->Prod)• Other
POLL
Please vote using the “votes from audience” tab in your BrightTALK panel
14
![Page 15: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/15.jpg)
APP. MIGRATION AUTOMATED WORKFLOW
15 | Confidential
Create a migration workflow
Map source to target IPs
Evaluate potential vulnerability and risk impact
Apply the changes
01 02 03 04
Migration Done!
05
App DecomissionWorkflow
Mark flow to decomission
ABF automatically validates no impact on other apps
Apply the changes Decommission Done!
01 02 03 04 05
![Page 16: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/16.jpg)
CALCULATE REQUIRED FLOW CHANGES
16 | Confidential
![Page 17: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/17.jpg)
AUTOMATICALLY IDENTIFY DEVICES IN PATH
![Page 18: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/18.jpg)
PROJECT DASHBOARD
18 | Confidential
![Page 19: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/19.jpg)
APPLICATION MIGRATION
19 | Confidential
Manual Process
Find all flows related to application
Locate all effected firewalls
Find all relevant rules
With Automation
Start a migration workflow - Match source network object with target
Execute changes: create new flows
Execute changes: decommission old flows
Change management process for new rules
Repeat process for old rule decommission
![Page 20: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/20.jpg)
20 | Confidential
DISASTER RECOVERY DEVICE PAIRS
![Page 21: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/21.jpg)
DISASTER RECOVERY DEVICES / PATHS
• Firewalls may be deployed in a geographic redundancy model to ensure reliable and secure connectivity.
• For devices without a central management system, maintaining the pair synced is a real challenge
• AlgoSec allows you to define DR-Sets: groups of devices that must always share the same policy
• Maintain consistency without any manual work and human errors
21| Confidential
CM
RA1
Device A
Geographical distribution architecture
Device B
![Page 22: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/22.jpg)
DR SETS – HOW IT LOOKS
22 | Confidential
![Page 23: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/23.jpg)
23 | Confidential
APPLICATION-CENTRIC RULE RE-CERTIFICATION
![Page 24: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/24.jpg)
How many times a year do you recertify your firewall rules?• On a project basis• Once a year• Twice a year• Once every 2 years• Other
POLL
Please vote using the “votes from audience” tab in your BrightTALK panel
24
1.On a project basis
![Page 25: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/25.jpg)
WHY FIREWALL RULES BECOME REDUNDANT
An application is decommissioned
An application is upgraded and uses
different services/ ports
An endpoint is moved to a different datacenter
Decommissioning of outdated rules is best practice:• Security: reduce attack surface and risk• Compliance: periodic reviews are mandated
![Page 26: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/26.jpg)
26 | Confidential
TRADITIONAL METHODOLOGY
REVIEWthe firewall logs and determine
when the rule was last used
READthe comments to
see who requested the rule
and which application it
serves
VALIDATEthat the
application is not in use with the
relevant contact
REMOVEthe rule or extend
the expiration date
![Page 27: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/27.jpg)
FIREWALL RULE BASE
![Page 28: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/28.jpg)
AN APPLICATION CENTRIC APPROACH
28 | Confidential
![Page 29: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/29.jpg)
AN APPLICATION CENTRIC APPROACH
29 | Confidential
Application Telepresence has expired
Telepresence
Dear Yonatan,
![Page 30: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/30.jpg)
AN APPLICATION CENTRIC APPROACH
30 | Confidential
![Page 31: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/31.jpg)
RULE DECOMMISSIONING
Manual Process
Manage each rule separately
Bombarded by rule recertification notifications
Problematic to track rules to originating purpose
With Automation
Business application expiration date
Timely configured notification – per application
Single click to decommission or extend expiration date
![Page 32: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/32.jpg)
SUMMARY
• Identifying assets and their connectivity is not trivial• Auto-discovery is key for informed connectivity management
• Network security operations are complex • Automation helps meet customers needs and ensures a secure network
• A high-end solution is designed to automate key use-cases with business-centric security policy management capabilities
• Example for common use-cases managed by Algosec:• Firewall devices in DR mode
• Application life-cycle and migration
• Application-centric approach to rule recertification
32 | Confidential
![Page 33: Webinar: How automation can transform the way you manage your network security policy final](https://reader031.fdocuments.us/reader031/viewer/2022021923/5a6e0d087f8b9a90468b4fd5/html5/thumbnails/33.jpg)
MORE RESOURCES
www.algosec.com/resources
WHITEPAPERS
DATASHEET
33