Your SlideShare is downloading. ×
A big “Howdy” from SolarWinds®<br />	based in Austin, Texas<br /><ul><li>Josh Stephens- VP of Technology & Head Geek
David Hurst – Network Security Guru & CTO, Athena Security</li></ul>Today’s Topic: <br />Network Security and Configuratio...
Who are our customers?
The SolarWinds community…</li></ul>Introduction<br />
Who is Athena Security?<br /><ul><li>What they do…
Who are their customers?
How do they relate to SolarWinds?</li></ul>Introduction Cont’d…<br />
Configuration Management
Managing access lists and firewall rules
Compliance Reporting
Network Security within a Virtualized Infrastructure
Introduction to Athena FirePac
Upcoming SlideShare
Loading in...5
×

The Must Do’s of Network Security and Configuration Management

1,093

Published on

For more information on NCM, visit: http://www.solarwinds.com/products/orion/configuration_manager/info.aspx

Watch this webcast: http://www.solarwinds.com/resources/webcasts/the-must-do-is-of-network-security-and-configuration-management.html

This webcast will focus on the “must do’s” of configuration management, compliance reporting, and network security within today’s complex and dynamic network environments. During this webcast we’ll cover:

• Configuration management best practices
• Compliance auditing and reporting
• Access control audits and remediation
• Managing access lists and firewall rules
• Network security within a virtualized infrastructure

During this event we’ll highlight not only technology from SolarWinds but also technology from Athena Security.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,093
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "The Must Do’s of Network Security and Configuration Management"

  1. 1.
  2. 2. A big “Howdy” from SolarWinds®<br /> based in Austin, Texas<br /><ul><li>Josh Stephens- VP of Technology & Head Geek
  3. 3. David Hurst – Network Security Guru & CTO, Athena Security</li></ul>Today’s Topic: <br />Network Security and Configuration Management Must Do’s<br />Who is SolarWinds?<br /><ul><li>What we do…
  4. 4. Who are our customers?
  5. 5. The SolarWinds community…</li></ul>Introduction<br />
  6. 6. Who is Athena Security?<br /><ul><li>What they do…
  7. 7. Who are their customers?
  8. 8. How do they relate to SolarWinds?</li></ul>Introduction Cont’d…<br />
  9. 9. Agenda<br /><ul><li>Introductions & Housekeeping
  10. 10. Configuration Management
  11. 11. Managing access lists and firewall rules
  12. 12. Compliance Reporting
  13. 13. Network Security within a Virtualized Infrastructure
  14. 14. Introduction to Athena FirePac
  15. 15. Summary and Q&A</li></li></ul><li>Housekeeping<br /><ul><li>Can you hear me now?
  16. 16. If not, use the GoToWebinar Q&A panel to contact the moderator
  17. 17. How do you ask questions?
  18. 18. Will this thing be recorded?</li></li></ul><li>Configuration Mgmt in a Nutshell<br /><ul><li>Managing configurations of:
  19. 19. Routers, firewalls, switches, IDSs and other network infrastructure devices.
  20. 20. Any CLI or menu driven device
  21. 21. Tasks such as:
  22. 22. Scheduled configuration backups
  23. 23. Automated bulk config changes
  24. 24. Real-time change detection and notification
  25. 25. Compliance needs for:
  26. 26. Policy management, verification, and remediation
  27. 27. Log collection, alerting, and storage</li></ul>J0sher2014<br />
  28. 28. Key areas of focus for Config Mgmt <br /><ul><li>Access Control:
  29. 29. ACL maintenance and audits
  30. 30. Firewall rule management
  31. 31. Compliance reporting
  32. 32. Auditing and validation of public policy compliance
  33. 33. Enforcement of private policies
  34. 34. Remediation of variances
  35. 35. Security in a virtualized environment
  36. 36. Security policy enforcement and deployment
  37. 37. Access control within virtual networks</li></ul>J0sher2014<br />
  38. 38. Configuration Management in Action<br />J0sher2014<br />
  39. 39. Orion NCM + Athena FirePAC<br />Rule/Object Cleanup<br />Change Validation<br />Advanced Query<br />SolarWinds Orion NCM<br />
  40. 40. CONFIGURATION BEST PRACTICES<br /><ul><li>Use default deny policy and reduce number of specific deny rules
  41. 41. Use rules that are as specific as possible, no “ANY” rules
  42. 42. Don’t multiply rules and objects unnecessarily
  43. 43. Be aware of the impact of NAT control
  44. 44. Use a stealth rule
  45. 45. Prevent external access to the firewall</li></li></ul><li>Rule/Object Cleanup<br /><ul><li>Remove all structurally redundant rules
  46. 46. Monitor usage over time to identify unused rules
  47. 47. Determine object usage per-rule and globally per object
  48. 48. Document business reason for the rules</li></li></ul><li>Advanced Query<br /><ul><li>What services are allowed to critical hosts
  49. 49. What sources can reach critical hosts
  50. 50. Does the firewall already implement a given policy
  51. 51. Identify what rules/objects to modify to implement a change request
  52. 52. What rules (ACL, NAT, route) implement a given policy</li></li></ul><li>Summary and Q&A<br />Thank you for attending!<br />To learn more or to download free 30-day trials of<br />SolarWinds products visit: www.SolarWinds.com<br />For Athena products visit www.athenasecurity.com<br />Contact information<br />SolarWindsAthena Security<br />Josh Stephens, Head Geek David Hurst, CTO<br />headgeek@solarwinds.com dhurst@athenasecurity.net<br />twitter: sw_headgeekwww.athenasecurity.net<br />Blog: http://solarwinds.com/geek Blog: http://blog.athenasecurity.net<br />

×