02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

101<br />

• Centralizing Network Security Policy Management: Managing security configurations across<br />

vendors and platforms, on-prem and hybrid cloud, from a single console will reduce the effort of<br />

managing multiple platforms and ensure consistency across the distributed network.<br />

• Providing Network Visibility: Understanding the connectivity of your network allows you to identify<br />

the specific elements to be modified, meaning change requests can be fulfilled easier and with<br />

better accuracy.<br />

• Documenting Network Changes: When it comes time to proving compliance, if all network change<br />

requests are documented, searchable and readily available, your audit tasks will be fulfilled, and<br />

your staff’s time will be freed up for other critical functions.<br />

• Policy Cleanup Automation: As time goes by, firewall policies tend to grow in size and complexity.<br />

New access is added, but rules and objects are never removed. Cleaning up redundant rules can<br />

create a more readable, easier-to-manage policy, but firewall teams seldom have the time for a<br />

cleanup project. By automating the decommissioning of redundant rules and objects this can be<br />

achieved quickly and with a fraction of the effort.<br />

Automate Network Changes<br />

Far too many organizations manually process routine and low-risk connectivity requests. These manual<br />

processes not only require a significant amount of time, but they’re also prone to errors and<br />

misconfigurations which can lead to serious downtime, a failed audit, or worse yet, a breach.<br />

Automating network changes through a well-documented process increases an organization’s<br />

operational efficiency, without the need for additional staff. It also eliminates resource-intensive mistakes<br />

and re-dos. Ultimately, this means gaining better control over access changes and reducing overall risk,<br />

using the staff that you already have in place.<br />

Empower Novice Engineers<br />

In many cases the skill shortage means that the team has diverse knowledge levels leading to an uneven<br />

distribution of the workload. Experienced engineers who are very familiar with the network and/or the<br />

security standards will be assigned with most routine changes and tasks and will not have time to work<br />

on any strategic projects. The only way to distribute the load more evenly is to integrate the expertise into<br />

an automated process to empower the novice staff with the daily changes.<br />

For example, a large utility company in the US leveraged security policy automation to empower their<br />

entry-level engineers and free their experienced staff to focus on strategic projects. By leveraging<br />

automated risk analysis against a unified security policy (USP) they were able to ensure that access<br />

requests did not violate their network segmentation policy and did not introduce new risks. By leveraging<br />

policy-driven automation, the company ensured valid implementation of changes even by those<br />

engineers who hadn’t memorized every routing table. The automated process itself also helps ensure<br />

consistent implementation and documentation of all changes across the team.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!