Business application deployments and changes require IT, networking and security teams to be more agile than ever before.
But frequently, this agility comes at the expense of security and compliance and enables network breaches and cyber-attacks.
In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, will cover how network security policy automation helps you avoid this conflict.
Join the webinar to learn how to:
• Plan for the entire network security lifecycle
• Discover your network topology and traffic flows
• Ensure continuous compliance and identify risks and compliance violations
• Easily implement changes across your hybrid network environment
• Mandate a consistent and unified change process
2. WELCOME
Have a question? Submit it via the chat tab or email us:
This webinar is being recorded!
The recording will be emailed to you after the webinar
And the slides will be available in the attachments tab
Follow AlgoSec online !
2
marketing@algosec.com
4. RUN FASTER!
• Constant demand for higher business agility
• Deliver in minutes/hours, not weeks/months
• Change is the only constant
• Technology enablers
• Continuous Integration/Deployment, DevOps
• Virtualization
• Cloud, Software Defined Networking (SDN)
DEV
OPS
5. PROTECT YOUR NETWORK BETTER!
• Attacks and breaches are constantly on the rise & more sophisticated
• Security must be stronger and tighter
• If not:
• Service outages
• Critical data leakage
• Audits will fail
• Your name in the news
7. THE BALANCING ACT
Security
Business Agility
• Security is left behind,
less strict, less control,
processes not followed
• Audits may fail
• Boardroom unhappy
• Your name on the news
• Full automation
• DevOps and App
developers are happy
8. THE BALANCING ACT
Security
Business Agility
• Security processes are
fully retained (clear
policy, approvals, full
documentation)
• Control
• DevOps is “90% automatic”
• Business cannot run fast
• Security is a painful
bottleneck
9. THE BALANCING ACT - REALITY
Trying to find the perfect balance:
• Both agility and security are affected
• Constant tension between Security and Apps teams
Security Business Agility
11. BUT WHAT IF YOU COULD…
HAVE YOUR
CAKE AND
EAT IT?
12. POLL #1
What is the greatest barrier to increasing the level of
automation in security operations?
Concerns about accuracy and security compliance
Concerns about business continuity
Lack of knowledge or tools
Difficulty driving organizational change
Lack of resources for automation project
Please vote using the “Votes“ tab
12
13. RESPONSIBLE AUTOMATION
• Automate, automate, automate
• Zero-touch (when possible)
• Unified, single change process
• Security checks and balances baked into the
automated process
• Escalation process
• Human intervention (only) when needed
• Full documentation
• Statistics & SLAs
15. AUTOMATION
Automate every step along the change process
Enables zero-touch changes within minutes – business agility
Saves time even when human intervention is required
Avoid typos and mistakes
Full and accurate documentation (for audit, undo change)
18. AUTOMATION – PLAN CHANGE
• Vendor-specific decisions – choose policy, zones, ACLs, objects
• Implement in an optimal way (avoid rule/object duplications)
• Enforce naming conventions and best practices
19. AUTOMATION – PUSH CHANGE TO DEVICE
• Push change to device management (via APIs) or directly to the
device (CLI)
REST API
20. AUTOMATION – VALIDATE CHANGE
• Verify change was implemented successfully and requested traffic is
now allowed
22. CONSISTENT UNIFIED CHANGE PROCESS
• Hybrid environment
• Virtual / Physical
• Multiple Vendors
• On-prem, Cloud, SDN
• All changes go through a single process
• Risk checks and exception handling
• Avoid inconsistent/contradictory
configurations
• All changes are fully documented,
audit trail ACI
23. DETECT OUT-OF-BAND CHANGES
Verify all changes go
through the process!
23
Monitor entire
security infrastructure
Alert in case of
out-of-band changes
25. STATISTICS
& SLA
• Track SLA
• Issue alerts on SLA
breaches
• Periodic reports
• Allows further fine-
tuning of the
automation process
48
30
18
10
7
6
5
JAN FEB MAR APR MAY JUN JUL
AVERAGE CHANGE
PROCESSING TIME (HOURS)
Zero touch
90%
Human Intervention
10%
Change Requests
28. 28
GAIN TRUST IN THE
AUTOMATED SOLUTION
• Start with more control
• Gradually increase degree of
automation
• Share quantitative data with all stake-
holders
• Monitor and fine-tune
29. FINE TUNING
• Study statistics
• What percentage of
changes required human
intervention?
• Why?
• How many SLA breaches?
• Consider widening pre-
approved policy, if
needed
Change Requests
Zero touch Human Intervention
30. • The Balancing Act
– Agility vs. Control
• How to Design a Security
Policy Automation Solution
• Built-in checks and balances
• Unified consistent process
• Deployment Best Practices
SUMMARY
30
32. Join our Online Community
Q&A
32
Send us your questions
Request a Free Evaluation:
marketing@algosec.com youtube.com/user/AlgoSec
linkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
33. UPCOMING WEBINARS
• July 30
Cisco ACI and your entire hybrid
network - Breaking down the Silos
with Holistic Central Policy
Management
• Aug 6
Putting the “NetSec” into DevOps
with Network Security Automation
• Aug 13
Best Practices for selecting a
Network Security Management
Solution
Today, we are going to talk about two groups:
Application owners: Fast and agile deployment
Security Team: Keep the company security policy
In this presentations:
Importance of Business context helps security teams to make the right decisions
Let’s summarize what we discussed, the situation today is that Security operations are not aware of the business applications since they lack visibility
The biggest pain point – and the solution:
We saw how easy it is to prevent outages caused by firewall misconfigurations
With ApplicationRule association
We can reduce the risk for outages and increase the speed of Rule recertification
And, lastly when we took a step by step look into the application lifecycle
We saw the impact of the Innovative and automatic application discovery technologies
How to simplify rule recertification
How to prevent breaches by associating vulnerability of business applications and firewall rules
How to ensure ongoing compliance and audit readiness
And, before we part – AlgoSummit and Upcoming webinars
And, before we part – AlgoSummit and Upcoming webinars