SlideShare a Scribd company logo
1 of 33
Ask the Expert: How to Build a Change Workflow
to Increase Control
Ruth Gomel, Director Product Design
Maya Malevich, Director Product Marketing
2
Ask the Expert: How to Build a Change Workflow
to Increase Control
Ruth Gomel, Director Product Design
Maya Malevich, Director Product Marketing
4
Agenda
Ask the Expert:
• Why Build a Change Workflow?
• How to Build the Process?
• What’s Next?
5
• Compliance
- Industry Regulations
- Internal security policies
- Organizational change process
- Organizational SLA
• Improve security by eliminating ad-hoc changes
• Reduce costs
Why Build a Change Workflow?
6
• PCI DSS Requirement 6.4: change control processes and
procedures for all changes to system components
• NERC CIP-010: change management process to ensure that
only authorized changes are made to the Cyber Assets + every
change must be documented to demonstrate proper
authorization was utilized.
• ISO 27001:2013 (Annex A) A.12.1.2 Change management:
changes to the organization, business processes, information
processing facilities, and systems that affect information security
have to be controlled
Compliance Mandates that Require a Change Process
7
Align With The Organizational Change Process
Organizational Change Process
8
The Risks Of Not Having a Process
9
How Much Does It Cost?
Delays
Redo’s
10
11
Before you start:
• Identify types of changes and prioritize them
• Identify stakeholders and include them in defining the process
• Get management buy-in
How to Build a Workflow?
12
The Building Blocks
4. Do 5.Validate
13
• Who is your user?
• Where is the ticket submitted?
- Email
- Ticketing system
- Portal page
- Dedicated application to control input
• What information is required?
1. Submit
14
Who needs to review?
• Manager
• Professional colleague
• Security review
• Other?
What information do they need?
2. Review
15
• Who should approve?
• What happens if they approve?
• What happens if they do not approve?
• What if they are away?
3. Approve
16
What should get done?
• Analyze
• Assess
• Design
• Implement
• Report
Is there a change window?
4. Do
17
How can results be validated?
• Requester Approves
• Implementation did not break anything
• Results match the request
5. Validate
18
6. Documentation
• Who: accountability
• What: accuracy
• When: and for how long
• Why: justification
19
Measuring Success
20
Making It Even Better: Automation
Time to implement a change reduced from 6-8 days to 6 hours (Energy company in EMEA)
• 50% reduction in time and effort of submitting changes
• 50%-75% reduction in time and effort for staging changes
(Large Financial Services company in the US)
• Go from missing 5-day SLAs to changes implemented within 1 hour
• Free up 67% of the time spent on ongoing changes so the team can focus elsewhere
(An Independent Agency of the US Federal Government)
Accelerate changes from 1-2 weeks to same day (Large Life Insurance Provider in the US)
Reduced the time to implement access changes from 1-2 months to a few days
(Large Energy provider in the US)
21
• Process Flow
• Steps
- Submission
- Approval under certain conditions
- Analysis and Design
- Implementation
- Validation
• Documentation
What to Automate?
22
We are the Security Policy Company
Who can talk to whom? What can talk to what?
23
About the Tufin Solution
Tufin Orchestration Suite
SecureApp™
SecureChange™
SecureTrack™
IT Service
Management
Other
3rd Party
Solutions
Scripting &
Automation
RESTAPIs
Firewalls Public CloudPrivate CloudNetworks
Unified Security Policy
Containers
Collectors and Provisioning Engines
Analysis Engines
24
Automated Network Security Change Process
Request from
App connectivity
Ticketing
Portal
Automated Risk
Assessment
1
Automated
Design
2
Automated
Provisioning
3
Audit
4
Maximize agility with end-to-end automation of network
security changes with baked-in security & compliance
25
Automated Risk Analysis
Automated Risk
Assessment
1
Automated
Design
2
Automated
Provisioning
3
Audit
4
Automated risk analysis for
Continuous policy compliance
26
Automated Network Security Change Design
Automated Risk
Assessment
1
Automated
Design
2
Automated
Provisioning
3
Audit
4
Automated change design
based on accurate topology
simulation & path analysis
across vendors & platforms
27
Automated, Accelerated Implementation
Automated Risk
Assessment
1
Automated
Design
2
Automated
Provisioning
3
Audit
4
Automated provisioning
across the hybrid network
from a single console
reduces complexity &
eliminates human error
28
Auditable Change Process
Automated Risk
Assessment
1
Automated
Design
2
Automated
Provisioning
3
Audit
4
Full accountability
with automatic audit trail of
all network security changes
Authorized
Unauthorized
Full audit trail over all
changes and their security
impact
29
Configurable Change Workflow
1
Create a new workflow in SecureChange and select its type. Each
workflow type is associated with a relevant template.
Add steps to the workflow according to the business process
2
Add relevant fields to each workflow step, and assign the step to
relevant user(s).
3
Activate and save the workflow. It is now ready to use and available in
the workflows list.
30
Open Platform to Enable Integrations
ITSM
VULNERABILITY
SCANNERS
IPAMSOAR
ENDPOINTSIEM
31
Case Study
THE PROBLEM
• Need a way to audit all changes
• Falling behind the business SLA
THE RESULT
THE SOLUTION
SecureChange™
SecureTrack™
Boosted agility and
productivity
• Changes implemented in 6
hours instead of 6-8 days
• Reduce costs and efforts for
audit prep (1-2 days)
• Enhance application delivery
and ensure service uptime
SecureApp™
32
Summary: Find the Right Balance
Questions?
Thank you

More Related Content

What's hot

Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGPAPNIC
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassSagarR24
 
Splitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 SubnetsSplitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 Subnetstmavroidis
 
IPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-onIPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-onAPNIC
 
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...Robb Boyd
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 
Cisco Call Manager - Ambiente e Topologias
Cisco Call Manager - Ambiente e TopologiasCisco Call Manager - Ambiente e Topologias
Cisco Call Manager - Ambiente e TopologiasVinicius Buscacio
 
OPENSHIFT CONTAINER PLATFORM CI/CD Build & Deploy
OPENSHIFT CONTAINER PLATFORM CI/CD Build & DeployOPENSHIFT CONTAINER PLATFORM CI/CD Build & Deploy
OPENSHIFT CONTAINER PLATFORM CI/CD Build & DeployNatale Vinto
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 FundamentalsMatt Bynum
 
Automate your network with Ansible and NAPALM
Automate your network with Ansible and NAPALMAutomate your network with Ansible and NAPALM
Automate your network with Ansible and NAPALMMohamed Radwan
 
Route Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsRoute Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsBangladesh Network Operators Group
 

What's hot (20)

Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGP
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Automating Network Infrastructure : Ansible
Automating Network Infrastructure : AnsibleAutomating Network Infrastructure : Ansible
Automating Network Infrastructure : Ansible
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
 
Splitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 SubnetsSplitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 Subnets
 
CCNA Lab Guide
CCNA Lab GuideCCNA Lab Guide
CCNA Lab Guide
 
IPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-onIPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-on
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
Ipv6
Ipv6Ipv6
Ipv6
 
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
Cisco Call Manager - Ambiente e Topologias
Cisco Call Manager - Ambiente e TopologiasCisco Call Manager - Ambiente e Topologias
Cisco Call Manager - Ambiente e Topologias
 
OPENSHIFT CONTAINER PLATFORM CI/CD Build & Deploy
OPENSHIFT CONTAINER PLATFORM CI/CD Build & DeployOPENSHIFT CONTAINER PLATFORM CI/CD Build & Deploy
OPENSHIFT CONTAINER PLATFORM CI/CD Build & Deploy
 
SAP ByDesign Development
SAP ByDesign DevelopmentSAP ByDesign Development
SAP ByDesign Development
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
Flow Monitoring Tools, What do we have, What do we need?
Flow Monitoring Tools, What do we have, What do we need?Flow Monitoring Tools, What do we have, What do we need?
Flow Monitoring Tools, What do we have, What do we need?
 
Automate your network with Ansible and NAPALM
Automate your network with Ansible and NAPALMAutomate your network with Ansible and NAPALM
Automate your network with Ansible and NAPALM
 
Route Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsRoute Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for Operators
 
Asterisk Complete Training
Asterisk Complete TrainingAsterisk Complete Training
Asterisk Complete Training
 

Similar to How to build a change workflow process

Governance Strategies for Office 365
Governance Strategies for Office 365Governance Strategies for Office 365
Governance Strategies for Office 365Montrium
 
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...Perficient
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesAlgoSec
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaEnergySec
 
Compliance superpowers aws chicago meetup august 16, 2018 [public]
Compliance superpowers   aws chicago meetup august 16, 2018 [public]Compliance superpowers   aws chicago meetup august 16, 2018 [public]
Compliance superpowers aws chicago meetup august 16, 2018 [public]Ben Blair
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy AutomationTufin
 
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Montrium
 
Leveraging DevOps Principles for Release and Deploy
Leveraging DevOps Principles for Release and DeployLeveraging DevOps Principles for Release and Deploy
Leveraging DevOps Principles for Release and DeploySerena Software
 
GLOC 2018: Automation or How We Eliminated Manual EBS R12.2 Upgrades and Beca...
GLOC 2018: Automation or How We Eliminated Manual EBS R12.2 Upgrades and Beca...GLOC 2018: Automation or How We Eliminated Manual EBS R12.2 Upgrades and Beca...
GLOC 2018: Automation or How We Eliminated Manual EBS R12.2 Upgrades and Beca...ennVee TechnoGroup Inc
 
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdf
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdfTest Automation using UiPath Test Suite - Developer Circle Part-1.pdf
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdfDiana Gray, MBA
 
Lean Solutions – Agile Transformation at the United States Postal Service
Lean Solutions  – Agile Transformation at the United States Postal ServiceLean Solutions  – Agile Transformation at the United States Postal Service
Lean Solutions – Agile Transformation at the United States Postal ServiceITSM Academy, Inc.
 
CITGO: Fueling Time Savings and Ensuring Quality with Automation
CITGO: Fueling Time Savings and Ensuring Quality with AutomationCITGO: Fueling Time Savings and Ensuring Quality with Automation
CITGO: Fueling Time Savings and Ensuring Quality with AutomationWorksoft
 
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...LN Mishra CBAP
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...Steffan Stringer
 
CITGO Fueling Time Savings and Ensuring Quality with Automation – TechEd 2015
CITGO Fueling Time Savings and Ensuring Quality with Automation – TechEd 2015CITGO Fueling Time Savings and Ensuring Quality with Automation – TechEd 2015
CITGO Fueling Time Savings and Ensuring Quality with Automation – TechEd 2015Worksoft
 
Unleashing change impact mining for sap dev ops
Unleashing change impact mining for sap dev opsUnleashing change impact mining for sap dev ops
Unleashing change impact mining for sap dev opsRahul Jacob
 
Simplify Salesforce Testing with AI-Driven Codeless Tools
Simplify Salesforce Testing with AI-Driven Codeless ToolsSimplify Salesforce Testing with AI-Driven Codeless Tools
Simplify Salesforce Testing with AI-Driven Codeless ToolsSauce Labs
 
Continuous validation of office 365
Continuous validation of office 365Continuous validation of office 365
Continuous validation of office 365Montrium
 
Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of TestingCuriosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of TestingCuriosity Software Ireland
 

Similar to How to build a change workflow process (20)

Governance Strategies for Office 365
Governance Strategies for Office 365Governance Strategies for Office 365
Governance Strategies for Office 365
 
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six Sigma
 
Compliance superpowers aws chicago meetup august 16, 2018 [public]
Compliance superpowers   aws chicago meetup august 16, 2018 [public]Compliance superpowers   aws chicago meetup august 16, 2018 [public]
Compliance superpowers aws chicago meetup august 16, 2018 [public]
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation
 
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
 
Leveraging DevOps Principles for Release and Deploy
Leveraging DevOps Principles for Release and DeployLeveraging DevOps Principles for Release and Deploy
Leveraging DevOps Principles for Release and Deploy
 
GLOC 2018: Automation or How We Eliminated Manual EBS R12.2 Upgrades and Beca...
GLOC 2018: Automation or How We Eliminated Manual EBS R12.2 Upgrades and Beca...GLOC 2018: Automation or How We Eliminated Manual EBS R12.2 Upgrades and Beca...
GLOC 2018: Automation or How We Eliminated Manual EBS R12.2 Upgrades and Beca...
 
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdf
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdfTest Automation using UiPath Test Suite - Developer Circle Part-1.pdf
Test Automation using UiPath Test Suite - Developer Circle Part-1.pdf
 
Lean Solutions – Agile Transformation at the United States Postal Service
Lean Solutions  – Agile Transformation at the United States Postal ServiceLean Solutions  – Agile Transformation at the United States Postal Service
Lean Solutions – Agile Transformation at the United States Postal Service
 
CITGO: Fueling Time Savings and Ensuring Quality with Automation
CITGO: Fueling Time Savings and Ensuring Quality with AutomationCITGO: Fueling Time Savings and Ensuring Quality with Automation
CITGO: Fueling Time Savings and Ensuring Quality with Automation
 
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
 
CITGO Fueling Time Savings and Ensuring Quality with Automation – TechEd 2015
CITGO Fueling Time Savings and Ensuring Quality with Automation – TechEd 2015CITGO Fueling Time Savings and Ensuring Quality with Automation – TechEd 2015
CITGO Fueling Time Savings and Ensuring Quality with Automation – TechEd 2015
 
Unleashing change impact mining for sap dev ops
Unleashing change impact mining for sap dev opsUnleashing change impact mining for sap dev ops
Unleashing change impact mining for sap dev ops
 
Simplify Salesforce Testing with AI-Driven Codeless Tools
Simplify Salesforce Testing with AI-Driven Codeless ToolsSimplify Salesforce Testing with AI-Driven Codeless Tools
Simplify Salesforce Testing with AI-Driven Codeless Tools
 
Continuous validation of office 365
Continuous validation of office 365Continuous validation of office 365
Continuous validation of office 365
 
Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of TestingCuriosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

How to build a change workflow process

  • 1. Ask the Expert: How to Build a Change Workflow to Increase Control Ruth Gomel, Director Product Design Maya Malevich, Director Product Marketing
  • 2. 2
  • 3. Ask the Expert: How to Build a Change Workflow to Increase Control Ruth Gomel, Director Product Design Maya Malevich, Director Product Marketing
  • 4. 4 Agenda Ask the Expert: • Why Build a Change Workflow? • How to Build the Process? • What’s Next?
  • 5. 5 • Compliance - Industry Regulations - Internal security policies - Organizational change process - Organizational SLA • Improve security by eliminating ad-hoc changes • Reduce costs Why Build a Change Workflow?
  • 6. 6 • PCI DSS Requirement 6.4: change control processes and procedures for all changes to system components • NERC CIP-010: change management process to ensure that only authorized changes are made to the Cyber Assets + every change must be documented to demonstrate proper authorization was utilized. • ISO 27001:2013 (Annex A) A.12.1.2 Change management: changes to the organization, business processes, information processing facilities, and systems that affect information security have to be controlled Compliance Mandates that Require a Change Process
  • 7. 7 Align With The Organizational Change Process Organizational Change Process
  • 8. 8 The Risks Of Not Having a Process
  • 9. 9 How Much Does It Cost? Delays Redo’s
  • 10. 10
  • 11. 11 Before you start: • Identify types of changes and prioritize them • Identify stakeholders and include them in defining the process • Get management buy-in How to Build a Workflow?
  • 12. 12 The Building Blocks 4. Do 5.Validate
  • 13. 13 • Who is your user? • Where is the ticket submitted? - Email - Ticketing system - Portal page - Dedicated application to control input • What information is required? 1. Submit
  • 14. 14 Who needs to review? • Manager • Professional colleague • Security review • Other? What information do they need? 2. Review
  • 15. 15 • Who should approve? • What happens if they approve? • What happens if they do not approve? • What if they are away? 3. Approve
  • 16. 16 What should get done? • Analyze • Assess • Design • Implement • Report Is there a change window? 4. Do
  • 17. 17 How can results be validated? • Requester Approves • Implementation did not break anything • Results match the request 5. Validate
  • 18. 18 6. Documentation • Who: accountability • What: accuracy • When: and for how long • Why: justification
  • 20. 20 Making It Even Better: Automation Time to implement a change reduced from 6-8 days to 6 hours (Energy company in EMEA) • 50% reduction in time and effort of submitting changes • 50%-75% reduction in time and effort for staging changes (Large Financial Services company in the US) • Go from missing 5-day SLAs to changes implemented within 1 hour • Free up 67% of the time spent on ongoing changes so the team can focus elsewhere (An Independent Agency of the US Federal Government) Accelerate changes from 1-2 weeks to same day (Large Life Insurance Provider in the US) Reduced the time to implement access changes from 1-2 months to a few days (Large Energy provider in the US)
  • 21. 21 • Process Flow • Steps - Submission - Approval under certain conditions - Analysis and Design - Implementation - Validation • Documentation What to Automate?
  • 22. 22 We are the Security Policy Company Who can talk to whom? What can talk to what?
  • 23. 23 About the Tufin Solution Tufin Orchestration Suite SecureApp™ SecureChange™ SecureTrack™ IT Service Management Other 3rd Party Solutions Scripting & Automation RESTAPIs Firewalls Public CloudPrivate CloudNetworks Unified Security Policy Containers Collectors and Provisioning Engines Analysis Engines
  • 24. 24 Automated Network Security Change Process Request from App connectivity Ticketing Portal Automated Risk Assessment 1 Automated Design 2 Automated Provisioning 3 Audit 4 Maximize agility with end-to-end automation of network security changes with baked-in security & compliance
  • 25. 25 Automated Risk Analysis Automated Risk Assessment 1 Automated Design 2 Automated Provisioning 3 Audit 4 Automated risk analysis for Continuous policy compliance
  • 26. 26 Automated Network Security Change Design Automated Risk Assessment 1 Automated Design 2 Automated Provisioning 3 Audit 4 Automated change design based on accurate topology simulation & path analysis across vendors & platforms
  • 27. 27 Automated, Accelerated Implementation Automated Risk Assessment 1 Automated Design 2 Automated Provisioning 3 Audit 4 Automated provisioning across the hybrid network from a single console reduces complexity & eliminates human error
  • 28. 28 Auditable Change Process Automated Risk Assessment 1 Automated Design 2 Automated Provisioning 3 Audit 4 Full accountability with automatic audit trail of all network security changes Authorized Unauthorized Full audit trail over all changes and their security impact
  • 29. 29 Configurable Change Workflow 1 Create a new workflow in SecureChange and select its type. Each workflow type is associated with a relevant template. Add steps to the workflow according to the business process 2 Add relevant fields to each workflow step, and assign the step to relevant user(s). 3 Activate and save the workflow. It is now ready to use and available in the workflows list.
  • 30. 30 Open Platform to Enable Integrations ITSM VULNERABILITY SCANNERS IPAMSOAR ENDPOINTSIEM
  • 31. 31 Case Study THE PROBLEM • Need a way to audit all changes • Falling behind the business SLA THE RESULT THE SOLUTION SecureChange™ SecureTrack™ Boosted agility and productivity • Changes implemented in 6 hours instead of 6-8 days • Reduce costs and efforts for audit prep (1-2 days) • Enhance application delivery and ensure service uptime SecureApp™
  • 32. 32 Summary: Find the Right Balance

Editor's Notes

  1. We are going to get started with a poll
  2. Your organization should have the appropriate methods to control any changes in to and out of your environment. PCI Requirement 6.4 requires that your organization’s Change Control Program includes a documented roll-back plan, a testing phase, management’s approval, and updated documentation. The PCI DSS warns, “Without properly documented and implemented change controls, security features could be inadvertently or deliberately omitted or rendered inoperable, processing irregularities could occur, or malicious code could be introduced.” PCI DSS also demands recertification (timely justification) of access rules.
  3. ITIL Change Advisory Board Urgent changes vs. Changes to critical services – limited to a change window
  4. Allow changes vs. Block changes
  5. Another poll: Which regulations do you need to comply with? PCI DSS ISO 27001 Industry-specific: HIPAA, NERC CIP, SOX or other Geo-specific: like GDPR None
  6. Automation journey
  7. Add access or remove access?
  8. Before and After: How long does it take to make a change? How many changes are processed per week? How long does it take to prepare for an audit? How many incidents are caused by misconfigurations? How many redo’s are required?
  9. Enterprises are seeing growing network complexity and fragmented, manual processes in security and network operations are too slow and error-prone to be effective. Without a central solution managing security policy across the complete network and cloud infrastructure, implementing connections manually takes days or weeks and results in errors and new security risks. For organizations who want to become agile, competitive and secure that’s no longer acceptable. We believe that there is a more informed, secure and efficient way to orchestrate security-related changes across enterprise networks, and have pioneered a security policy management platform to bring automation and analytics to security and network operations. The types of policies that we manage are network policies: who can talk to whom or what can talk to what on the network
  10. Our customers deploy SecureChange to break the endless loop of chasing none compliant changes by embedding the security policy into the network change process. SecureChange leverages the analysis and provisioning engines of SecureTrack and aligns with the unified security policy that is defined in SecureTrack. SecureChange customers who leverage the automation capabilities of the product implement network changes in minutes instead of days, with dramatically better security and accuracy.
  11. Tufin’s end-to-end automation increases agility with security. Tufin provides automation at every step of the change process, as well as automation for the process flow itself. Click: Network security change requests can originate from the application connectivity model we discussed in the previous slide, from a 3rd party ticketing system like Remedy or ServiceNow, or from a custom user portal.
  12. To ensure security and compliance together with agility, Tufin provides automated risk analysis. Each network security change request is proactively examined against the central security policy baseline to identify and address potential violations. A few ways to address violations are: Automated escalation for security approval (completely customizable) Allow temporary exception with an expiration date Reject the ticket or return to the requester for adjustments
  13. Once security and compliance are cleared/approved, the change can be automatically designed to provide a clear and accurate implementation plan. Tufin delivers trusted design based on accurate topology simulation and path analysis across heterogeneous platforms and topology architecture. Here’s how it works - Tufin: Automatically selects the target policies in the topology path of the requested change Identifies the targets that require a change in policy to allow requested access Designs the optimal policy change for the specific target (avoid shadowing, add object/group/rule)
  14. Tufin provides automated provisioning for leading firewall and next-generation firewall platforms – such as Check Point, Palo Alto, Fortinet, Cisco, Juniper, also Forcepoint which is the new brand for Stonesoft Next-Generation Firewalls. Provisioning can be triggered automatically for zero-touch process flow, or activated from the designer.
  15. Finally, Tufin provides every aspect of ensuring compliance and audit readiness with: Real-time change monitoring and accountability Automatic audit trail Automatic change verification and authorization against approved change requests Complete history of each change request Reporting
  16. Quote from RWE: The cloud team accidentally deleted 15 servers and immediately setup 15 new servers. “In a normal way that would have meant death for that application for a few weeks”, but by using application-based automation the server group was updated and the application was back up in 15 minutes.
  17. To summarize, there is a lot of planning that needs to go into building a change workflow, but you shouldn’t let it stop you. There are great benefits, so if there are blockers try to start small, prove the value, and then continue.