5 things you didnt know you could do with security policy management

33
5 THINGS YOU DIDN’T KNOW YOU COULD DO WITH A SECURITY POLICY MANAGEMENT SOLUTION Edy Almer

Upload: algosec

Post on 11-Apr-2017

133 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: 5 things you didnt know you could do with security policy management

5 THINGS YOU DIDN’T KNOW YOU COULD DO WITH A SECURITY POLICY MANAGEMENT SOLUTION

Edy Almer

Page 2: 5 things you didnt know you could do with security policy management

GOALS FOR TODAY

AlgoSec helps you manage security, reduce risk and respond to incidents, while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

In this webinar we’ll cover how to:

• Automate end-to end change management cross public and private cloud – not just orchestration

• Perform a fully automated, zero-touch security policy change• Make patching and vulnerability assessment business-driven

• Make your cyber response business application-aware and automate it

• Automate firewall migrations

2 | Confidential

Page 3: 5 things you didnt know you could do with security policy management

3 | Confidential

END-TO-END CHANGE MANAGEMENT

Page 4: 5 things you didnt know you could do with security policy management

END TO END CHANGE MANAGEMENT

• Network and security change requests keeps piling up

• With them, new technologies and deployments of security devices

• SDN, Cloud, multiple firewall vendors… - managing changes is a pain

• What if you could get a single location to submit the change requests and that automates the entire change process for you?

4 | Confidential

Page 5: 5 things you didnt know you could do with security policy management

FIRST – AUTOMATICALLY FIND BLOCKING DEVICES

• Utilizes the AlgoSec understanding of the network

• Combines with advanced network analysis algorithms

• Completely vendor agnostic

• Focuses on the devices that require change

• If nothing requires change – automatically closes the change request

5 | Confidential

Page 6: 5 things you didnt know you could do with security policy management

FIRST – AUTOMATICALLY FIND BLOCKING DEVICES

6 | Confidential

Page 7: 5 things you didnt know you could do with security policy management

SECOND – RISK CHECK

• What-if analysis for proactive security checks

• Verifies compliance with the organizational security policy

• Everything the security analyst needs – ready and waiting

• Did we mention it is vendor agnostic?

7 | Confidential

Page 8: 5 things you didnt know you could do with security policy management

SECOND – RISK CHECK

8 | Confidential

Page 9: 5 things you didnt know you could do with security policy management

THIRD – IMPLEMENTATION

• Every relevant device gets an implementation recommendation

• Add a rule, remove a rule or even edit an existing rule

• In the language and according to the limitations of each device

• Implement to the device with a click of a button (ActiveChange)

9 | Confidential

Page 10: 5 things you didnt know you could do with security policy management

THIRD – IMPLEMENTATION

10 | Confidential

Page 11: 5 things you didnt know you could do with security policy management

FINALLY - VALIDATION

• Automatically validates the change request was implemented properly

• Step 1 – make sure traffic is now allowed

• Step 2 – make sure the implementation was accurate

• This is it – end to end in minutes, on premise / public cloud / routers / firewalls – doesn’t matter

11 | Confidential

Page 12: 5 things you didnt know you could do with security policy management

FINALLY - VALIDATION

12 | Confidential

Page 13: 5 things you didnt know you could do with security policy management

13 | Confidential

AUTOMATION – ALL THE WAY

Page 14: 5 things you didnt know you could do with security policy management

INTRODUCING – ZERO-TOUCH WORKFLOW

• If no severe risks are found – why delay?

• Workflows can be configured to be fully automated

• Running through the different stages without human intervention

• Request to implementation in minutes without spending any time

• We even have such out-of-the-box workflow – try it

14 | Confidential

Page 15: 5 things you didnt know you could do with security policy management

INTRODUCING – ZERO-TOUCH WORKFLOW

15 | Confidential

Page 16: 5 things you didnt know you could do with security policy management

16 | Confidential

TYING VULNERABILITIES TO THE BUSINESS

Page 17: 5 things you didnt know you could do with security policy management

MAKE THE BUSINESS OWNER OWN THE SECURITY

• Vulnerability scanners generate a lot of results

• Security engineers are responsible for prioritizing and remediating

• Usually prioritization is according to the severity based on inputs from the scanner

• What about the business impact?

• Vulnerabilities are presented in the context of an application

• Visibility to the most vulnerable applications including drill down

• You can even schedule a periodic C-level report for this info

• Now the business owner can own the security as well

17 | Confidential

Page 18: 5 things you didnt know you could do with security policy management

VULNERABILITIES IN THE BUSINESS CONTEXT

18 | Confidential

Page 19: 5 things you didnt know you could do with security policy management

VULNERABILITIES IN THE BUSINESS CONTEXT

19 | Confidential

Page 20: 5 things you didnt know you could do with security policy management

20 | Confidential

TIE CYBER ATTACKS TO THE BUSINESS IMPACT

Page 21: 5 things you didnt know you could do with security policy management

INTEGRATION WITH SIEM SYSTEMS

• Your SOC engineer is working on a cyber attack

• A server is flagged as exposed to an attack

• Fast impact analysis and isolation are required

• Introducing – the AlgoSec plugin for your SIEM system

• Get instant visibility to the applications impacted by this server

• Find out if the server is exposed to the Internet

• Immediately initiate isolation of the exposed server

• In the process – no need to leave the SIEM system interface

21 | Confidential

Page 22: 5 things you didnt know you could do with security policy management

INTEGRATION WITH SIEM SYSTEMS

• Your SOC engineer is working on a cyber attack

• A server is flagged as exposed to an attack

• Fast impact analysis and isolation are required

• Introducing – the AlgoSec plugin to your SIEM system

• Get instant visibility to the applications impacted by this server

• Find out if the server is exposed to the Internet

• Immediately initiate isolation of the exposed server

• In the process – no need to leave the SIEM system interface

22 | Confidential

Page 23: 5 things you didnt know you could do with security policy management

BUSINESS APPLICATIONS IMPACTED BY INCIDENT

23 | Confidential

- Critical application?(priority, business impact)

- Firewall in path for internet connectivity

Page 24: 5 things you didnt know you could do with security policy management

INCIDENT REACHABILITY ANALYSIS

24 | Confidential

Can reach Internet?

Data exfiltration

Can reach critical zones?

Damage potential

Page 25: 5 things you didnt know you could do with security policy management

REMEDIATION – AUTOMATE SERVER ISOLATION

25 | Confidential

Change request to drop traffic to/from infected server (auto-flow)

Page 26: 5 things you didnt know you could do with security policy management

26 | Confidential

AUTOMATIC FIREWALL MIGRATIONS

Page 27: 5 things you didnt know you could do with security policy management

FIREWALL MIGRATION – WHY NOT AUTOMATE

• Migrating firewalls is just another big change request

• Manual or semi-manual processes result in human errors

• AlgoSec has visibility into the policies

• AlgoSec knows how to run change requests

• AlgoSec can push changes to devices

• Nothing missing – Let’s automate

• Introducing - firewall migration in three steps

27 | Confidential

Page 28: 5 things you didnt know you could do with security policy management

STEP 1 – EXPORTING SOURCE POLICY

28 | Confidential

Page 29: 5 things you didnt know you could do with security policy management

STEP 2 – OPEN A VERBATIM CHANGE REQUEST

29 | Confidential

Page 30: 5 things you didnt know you could do with security policy management

STEP 3 – SIT BACK AND WAIT

30 | Confidential

• It is that simple!

Page 31: 5 things you didnt know you could do with security policy management

WHAT DID WE SEE TODAY ?

•Automate end-to-end change management –with zero touch

•Make your patching and vulnerability assessment business-driven

•Make your cyber response business application-aware and automate it

•Automate firewall migrations

31 | Confidential

Page 32: 5 things you didnt know you could do with security policy management

MORE RESOURCES

32