SlideShare una empresa de Scribd logo
1 de 35
AVOIDING THE SECURITY/AGILITY
TRADEOFF WITH NETWORK
SECURITY POLICY AUTOMATION
Yitzy Tannenbaum
Product Marketing Manager, AlgoSec
WELCOME
Have a question? Submit it via the chat tab or email us:
This webinar is being recorded!
The recording will be emailed to you after the webinar
And the slides will be available in the attachments tab
Follow AlgoSec online !
2
marketing@algosec.com
AGENDA
Introduction01
The Balancing Act02
“Have Your Cake and Eat It Too”03
3
04 Security Policy Automation –
Solution Requirements
05 Summary
RUN FASTER!
• Constant demand for higher business agility
• Deliver in minutes/hours, not weeks/months
• Change is the only constant
• Technology enablers
• Continuous Integration/Deployment, DevOps
• Virtualization
• Cloud, Software Defined Networking (SDN)
DEV
OPS
PROTECT YOUR NETWORK BETTER!
• Attacks and breaches are constantly on the rise & more sophisticated
• Security must be stronger and tighter
• If not:
• Service outages
• Critical data leakage
• Audits will fail
• Your name in the news
AGENDA
Introduction01
The Balancing Act02
“Have Your Cake and Eat It Too”03
6
04 Security Policy Automation –
Solution Requirements
05 Summary
THE BALANCING ACT
Security
Business Agility
• Security is left behind,
less strict, less control,
processes not followed
• Audits may fail
• Boardroom unhappy
• Your name on the news
• Full automation
• DevOps and App
developers are happy
THE BALANCING ACT
Security
Business Agility
• Security processes are
fully retained (clear
policy, approvals, full
documentation)
• Control
• DevOps is “90% automatic”
• Business cannot run fast
• Security is a painful
bottleneck
THE BALANCING ACT - REALITY
Trying to find the perfect balance:
• Both agility and security are affected
• Constant tension between Security and Apps teams
Security Business Agility
AGENDA
Introduction01
The Balancing Act02
“Have Your Cake & Eat It Too”03
10
04 Security Policy Automation –
Solution Requirements
05 Summary
BUT WHAT IF YOU COULD…
HAVE YOUR
CAKE AND
EAT IT?
POLL #1
What is the greatest barrier to increasing the level of
automation in security operations?
 Concerns about accuracy and security compliance
 Concerns about business continuity
 Lack of knowledge or tools
 Difficulty driving organizational change
 Lack of resources for automation project
Please vote using the “Votes“ tab
12
RESPONSIBLE AUTOMATION
• Automate, automate, automate
• Zero-touch (when possible)
• Unified, single change process
• Security checks and balances baked into the
automated process
• Escalation process
• Human intervention (only) when needed
• Full documentation
• Statistics & SLAs
AGENDA
Introduction01
The Balancing Act02
“Have Your Cake and Eat It Too”03
14
04
Security Policy Automation
– Solution Requirements
05 Summary
AUTOMATION
Automate every step along the change process
Enables zero-touch changes within minutes – business agility
Saves time even when human intervention is required
Avoid typos and mistakes
Full and accurate documentation (for audit, undo change)
AUTOMATION – FIND RELEVANT SECURITY DEVICES
AUTOMATION – RISK CHECK
AUTOMATION – PLAN CHANGE
• Vendor-specific decisions – choose policy, zones, ACLs, objects
• Implement in an optimal way (avoid rule/object duplications)
• Enforce naming conventions and best practices
AUTOMATION – PUSH CHANGE TO DEVICE
• Push change to device management (via APIs) or directly to the
device (CLI)
REST API
AUTOMATION – VALIDATE CHANGE
• Verify change was implemented successfully and requested traffic is
now allowed
Validate the
change
Map
devices in
path
Check for
risk
involved
Plan the
Rules
Implement
the change
on the
devices
CHANGE AUTOMATION
Request a
network
change
CONSISTENT UNIFIED CHANGE PROCESS
• Hybrid environment
• Virtual / Physical
• Multiple Vendors
• On-prem, Cloud, SDN
• All changes go through a single process
• Risk checks and exception handling
• Avoid inconsistent/contradictory
configurations
• All changes are fully documented,
audit trail ACI
DETECT OUT-OF-BAND CHANGES
Verify all changes go
through the process!
23
Monitor entire
security infrastructure
Alert in case of
out-of-band changes
Full
Audit Trail
Compliance
and Audits
Trouble-
shooting
Ability to
undo changes
DOCUMENTATION AND LOGGING
Including Human
Approvals
24
STATISTICS
& SLA
• Track SLA
• Issue alerts on SLA
breaches
• Periodic reports
• Allows further fine-
tuning of the
automation process
48
30
18
10
7
6
5
JAN FEB MAR APR MAY JUN JUL
AVERAGE CHANGE
PROCESSING TIME (HOURS)
Zero touch
90%
Human Intervention
10%
Change Requests
26
DEPLOYMENT
CONSIDERATIONS
DEFINING PRE-APPROVED SECURITY POLICY
Low Risk
27
“More
of the same”
28
GAIN TRUST IN THE
AUTOMATED SOLUTION
• Start with more control
• Gradually increase degree of
automation
• Share quantitative data with all stake-
holders
• Monitor and fine-tune
FINE TUNING
• Study statistics
• What percentage of
changes required human
intervention?
• Why?
• How many SLA breaches?
• Consider widening pre-
approved policy, if
needed
Change Requests
Zero touch Human Intervention
• The Balancing Act
– Agility vs. Control
• How to Design a Security
Policy Automation Solution
• Built-in checks and balances
• Unified consistent process
• Deployment Best Practices
SUMMARY
30
31
https://www.algosec.com/resources
Whitepapers
Datasheet
Webinar Slides
Prof. Wool Video Courses
Join our Online Community
Q&A
32
Send us your questions
Request a Free Evaluation:
marketing@algosec.com youtube.com/user/AlgoSec
linkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
UPCOMING WEBINARS
• July 30
Cisco ACI and your entire hybrid
network - Breaking down the Silos
with Holistic Central Policy
Management
• Aug 6
Putting the “NetSec” into DevOps
with Network Security Automation
• Aug 13
Best Practices for selecting a
Network Security Management
Solution
THE PREMIER EVENT
FOR
ALGOSEC
CUSTOMERS &
CHANNEL PARTNERS
34
Australia – September
Dallas - October 21-24
2019
www.algosec.com/algosummit
THANK YOU!
Questions & Request for Demo:
marketing@algosec.com

Más contenido relacionado

Más de AlgoSec

Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to executionAlgoSec
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationAlgoSec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...AlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...AlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solutionAlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarAlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteAlgoSec
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation finalAlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...AlgoSec
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationAlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinarAlgoSec
 

Más de AlgoSec (20)

Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 

Último

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Security Change Management Agility and Control

  • 1. AVOIDING THE SECURITY/AGILITY TRADEOFF WITH NETWORK SECURITY POLICY AUTOMATION Yitzy Tannenbaum Product Marketing Manager, AlgoSec
  • 2. WELCOME Have a question? Submit it via the chat tab or email us: This webinar is being recorded! The recording will be emailed to you after the webinar And the slides will be available in the attachments tab Follow AlgoSec online ! 2 marketing@algosec.com
  • 3. AGENDA Introduction01 The Balancing Act02 “Have Your Cake and Eat It Too”03 3 04 Security Policy Automation – Solution Requirements 05 Summary
  • 4. RUN FASTER! • Constant demand for higher business agility • Deliver in minutes/hours, not weeks/months • Change is the only constant • Technology enablers • Continuous Integration/Deployment, DevOps • Virtualization • Cloud, Software Defined Networking (SDN) DEV OPS
  • 5. PROTECT YOUR NETWORK BETTER! • Attacks and breaches are constantly on the rise & more sophisticated • Security must be stronger and tighter • If not: • Service outages • Critical data leakage • Audits will fail • Your name in the news
  • 6. AGENDA Introduction01 The Balancing Act02 “Have Your Cake and Eat It Too”03 6 04 Security Policy Automation – Solution Requirements 05 Summary
  • 7. THE BALANCING ACT Security Business Agility • Security is left behind, less strict, less control, processes not followed • Audits may fail • Boardroom unhappy • Your name on the news • Full automation • DevOps and App developers are happy
  • 8. THE BALANCING ACT Security Business Agility • Security processes are fully retained (clear policy, approvals, full documentation) • Control • DevOps is “90% automatic” • Business cannot run fast • Security is a painful bottleneck
  • 9. THE BALANCING ACT - REALITY Trying to find the perfect balance: • Both agility and security are affected • Constant tension between Security and Apps teams Security Business Agility
  • 10. AGENDA Introduction01 The Balancing Act02 “Have Your Cake & Eat It Too”03 10 04 Security Policy Automation – Solution Requirements 05 Summary
  • 11. BUT WHAT IF YOU COULD… HAVE YOUR CAKE AND EAT IT?
  • 12. POLL #1 What is the greatest barrier to increasing the level of automation in security operations?  Concerns about accuracy and security compliance  Concerns about business continuity  Lack of knowledge or tools  Difficulty driving organizational change  Lack of resources for automation project Please vote using the “Votes“ tab 12
  • 13. RESPONSIBLE AUTOMATION • Automate, automate, automate • Zero-touch (when possible) • Unified, single change process • Security checks and balances baked into the automated process • Escalation process • Human intervention (only) when needed • Full documentation • Statistics & SLAs
  • 14. AGENDA Introduction01 The Balancing Act02 “Have Your Cake and Eat It Too”03 14 04 Security Policy Automation – Solution Requirements 05 Summary
  • 15. AUTOMATION Automate every step along the change process Enables zero-touch changes within minutes – business agility Saves time even when human intervention is required Avoid typos and mistakes Full and accurate documentation (for audit, undo change)
  • 16. AUTOMATION – FIND RELEVANT SECURITY DEVICES
  • 18. AUTOMATION – PLAN CHANGE • Vendor-specific decisions – choose policy, zones, ACLs, objects • Implement in an optimal way (avoid rule/object duplications) • Enforce naming conventions and best practices
  • 19. AUTOMATION – PUSH CHANGE TO DEVICE • Push change to device management (via APIs) or directly to the device (CLI) REST API
  • 20. AUTOMATION – VALIDATE CHANGE • Verify change was implemented successfully and requested traffic is now allowed
  • 21. Validate the change Map devices in path Check for risk involved Plan the Rules Implement the change on the devices CHANGE AUTOMATION Request a network change
  • 22. CONSISTENT UNIFIED CHANGE PROCESS • Hybrid environment • Virtual / Physical • Multiple Vendors • On-prem, Cloud, SDN • All changes go through a single process • Risk checks and exception handling • Avoid inconsistent/contradictory configurations • All changes are fully documented, audit trail ACI
  • 23. DETECT OUT-OF-BAND CHANGES Verify all changes go through the process! 23 Monitor entire security infrastructure Alert in case of out-of-band changes
  • 24. Full Audit Trail Compliance and Audits Trouble- shooting Ability to undo changes DOCUMENTATION AND LOGGING Including Human Approvals 24
  • 25. STATISTICS & SLA • Track SLA • Issue alerts on SLA breaches • Periodic reports • Allows further fine- tuning of the automation process 48 30 18 10 7 6 5 JAN FEB MAR APR MAY JUN JUL AVERAGE CHANGE PROCESSING TIME (HOURS) Zero touch 90% Human Intervention 10% Change Requests
  • 27. DEFINING PRE-APPROVED SECURITY POLICY Low Risk 27 “More of the same”
  • 28. 28 GAIN TRUST IN THE AUTOMATED SOLUTION • Start with more control • Gradually increase degree of automation • Share quantitative data with all stake- holders • Monitor and fine-tune
  • 29. FINE TUNING • Study statistics • What percentage of changes required human intervention? • Why? • How many SLA breaches? • Consider widening pre- approved policy, if needed Change Requests Zero touch Human Intervention
  • 30. • The Balancing Act – Agility vs. Control • How to Design a Security Policy Automation Solution • Built-in checks and balances • Unified consistent process • Deployment Best Practices SUMMARY 30
  • 32. Join our Online Community Q&A 32 Send us your questions Request a Free Evaluation: marketing@algosec.com youtube.com/user/AlgoSec linkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  • 33. UPCOMING WEBINARS • July 30 Cisco ACI and your entire hybrid network - Breaking down the Silos with Holistic Central Policy Management • Aug 6 Putting the “NetSec” into DevOps with Network Security Automation • Aug 13 Best Practices for selecting a Network Security Management Solution
  • 34. THE PREMIER EVENT FOR ALGOSEC CUSTOMERS & CHANNEL PARTNERS 34 Australia – September Dallas - October 21-24 2019 www.algosec.com/algosummit
  • 35. THANK YOU! Questions & Request for Demo: marketing@algosec.com

Notas del editor

  1. Today, we are going to talk about two groups: Application owners: Fast and agile deployment Security Team: Keep the company security policy In this presentations: Importance of Business context  helps security teams to make the right decisions
  2. Let’s summarize what we discussed, the situation today is that Security operations are not aware of the business applications since they lack visibility The biggest pain point – and the solution: We saw how easy it is to prevent outages caused by firewall misconfigurations With ApplicationRule association We can reduce the risk for outages and increase the speed of Rule recertification And, lastly when we took a step by step look into the application lifecycle We saw the impact of the Innovative and automatic application discovery technologies How to simplify rule recertification How to prevent breaches by associating vulnerability of business applications and firewall rules How to ensure ongoing compliance and audit readiness
  3. And, before we part – AlgoSummit and Upcoming webinars
  4. And, before we part – AlgoSummit and Upcoming webinars