SlideShare a Scribd company logo
1 of 43
June 27, 2018
5 Clear Signs You Need
Security Policy Automation
Hadas Lahav | Product Management lead for automation
Maya Malevich | Director of Product Marketing, Tufin
History of Automation
500-900 AD
1335
1913
1943
Future ?
Today
Sometimes we miss the signs . . .
Agenda
• The five signs
• Security policy automation
• How to get started: Use Cases
• Benefits
• Next steps
Number 1: Change processes are slow and manual
• Unable to complete tasks on time
• Spend too much time on mundane tasks
• Unable to focus on what matters most
• Team is inefficient and not meeting SLAs
• You are understaffed and find it very hard to
hire new people
Number 2: Cloud First Initiatives
1. Zero visibility into cloud workloads
2. Network is unable to adapt and change with the
environment, or at the same pace
3. You have not idea how to ensure changes are
made according to security policy
Number 3: Business is hopping around you
1. The business is asking you to move faster but you
are worried about a breach
2. Unable to meet business requirements/SLA
3. Competition is doing better – releasing more
features, faster
4. You have a Shadow IT problem
Number 4: The hole is getting deeper
1. You have different business units submitting
change requests, very frequently
2. Your rulebase is a mess
• Shadowed rules
• Redundant rules
• Unused rules
• Overly permissive
3. You can’t respond to security threats confidently
4. Errors and misconfigurations are common
5. Need to redo at least 20% of change requests
Number 5: You can’t prove compliance
1. Unable to meet internal/external compliance
standards
1. Failed an audit
2. Paid a big fine
2. Analyzing configurations has grown beyond the
capacity of human computation
3. You can’t measure what you can’t see
The need: A real life example
10
600 Requests/Changes modelled and assessed
during 2017/18
 18% (108) were rejected as not required
 13% (65) required amending as partially
implemented
 Of which 8% (38) failed the implementation
check
 Lack of visibility of the Network Estate
 Multiple Vendors / outsource partners
 No single source of the truth
 Fault Finding
 3 sets of outsource partners on calls trying to identify
issues performing traces
 Limited Pre-change technical assessment
 Manual assessment done by technical people
 No Post Change validation and accountability
 Passed to requestor to check things work
They discovered problems . . .
So Why Don’t we Automate?
● Cultural resistance/fear
● Lack of visibility
● It’s too hard/ too complex
● Have tried automating with scripts and failed
● Don’t know how to get started
John F Kennedy
automation does not need
to be our enemy…
The Call for Security Automation
PRODUCTIVITY
AGILITY
SECURITY
Why Automate Now?
Why Security Policy?
Enterprise Networks are Fragmented
Private Cloud
Firewalls from different vendors
1000s of routers and switches
Public Cloud
Microservices/
Containers
Not just fragmented infrastructure - Fragmented processes
Different teams handle different
parts of the network
The network will become even more complex and fragmented
Security Policy
• The network of the future will be software-defined and
automated
• Security cannot be managed at scale without a
centralized policy
Best Practices
1. Start small: Organizations are choosing to focus first on the easier
areas of automation as they begin their automation journey
2. Automate on security policy changes: ESG Research shows only 1% of those
surveyed found automation to be not at all important
19
Critical, 34%
Very important, 52%
Somewhat important,
13%
Not at all important,
1%
USE CASES
Group Modification
Typical Scenario
• Constant changes to user and firewall groups that are poorly documented
• Manual change processes on multi vendor firewalls
Problem: Manual Processes
• Too long time to deploy
• Increase maintenance workload
• Leads to human errors
Automated Group Object Modification to create and maintain groups
simply and accurately
Group Modification
22
1
Create a new group or update an existing group by submitting a Group
Modification ticket in SecureChange
2
Design and Provision changes automatically using SecureChange
Designer tool
on Palo Alto, Cisco ASA, Fortinet and Check Point devices
• Ensure full auditability via a dedicated report and ticket history
Typical Scenario
• Security policies degrade over time, resulting in rules which are fully shadowed or disabled,
or rules with no hits
Problem
• Poorly maintained rulebase
• Unused rules may increase the attack surface
• Increases the complexity of firewall maintenance
Automated Rule Decommissioning with complete change
documentation
Typical Use-Case 2: Rule Decommissioning
1
Identify obsolete & risky rules by searching the Policy Browser, and add
them to a ticket
Rule Decommissioning
24
2
Select action and workflow, and submit the ticket in SecureChange3
Design and Provision changes automatically using SecureChange
Designer tool
on Palo Alto, Cisco ASA, Fortinet and Check Point devices
4
Ensure full auditability via a dedicated report and ticket history
Typical Scenario
• Servers no longer in use but rules have not been removed from network
Problem
• Unused servers which are still defined in firewall policies weaken security posture and increase
maintenance complexity
• IT teams find it difficult to assess the impact of server removal on firewall policies in a complex
network environment
Automated Server Decommissioning to identify unused servers
• Automatically analyze and understand impact of removal
• Decommission servers and automatically update relevant rule pathways
Typical Use-Case 2: Server Decommissioning
Server Decommissioning
26
1
Open a Server Decommission ticket and perform impact analysis to
understand where the server is being used
2
Design and Provision changes automatically using SecureChange
Designer tool
on Palo Alto, Cisco ASA, Fortinet and Check Point devices
• Ensure full auditability via a dedicated report and ticket history
Problems Solved by
Security Policy Automation
Skill Shortage and Automation
73%
Source: Life and Times of Security Professionals, ESG and ISAA, Nov 2017
of survey respondents agree that new
types of security automation
technologies will have a positive impact
on cybersecurity workload
TIME ERRORS
Compliance
● Compliance is a key driver in
security budget
● Meet compliance mandates
COMPLIANCE
Eliminate Mistakes and Misconfigurations
Automation of security tasks & processes
efficient
fast
error-free
Secured!
+
+
=
Security Policy Automation Benefits
31
AUTOMATION
• Implement changes in minutes instead of days
• Strengthen security and reduce the attack surface
• Reduce complexity for multi-vendor environments
• Improve audit readiness and achieve continuous
compliance
We are the Security Policy Company
Network Security Policy Automation and Orchestration
Security Policy Management
Maturity Model
Slow
Risky
Business Agility
Security
Visibility
Cleanup
Analysis & Design
Application driven
Zero touch
Security Policy Orchestration Across the Next Generation Network
Move Fast and Secure Things: Continuous Security
• Security automation across DevOps lifecycle
• Integration with CI/CD tools
• Orchestrate 3rd party security services
Dev Ops
• Visibility of all microservice connections
• Identify and protect vulnerable containers
• Policy-based response to threats
36
Managing Your Security Policy . . . Everywhere
A continuum from the macro to the micro
Traditional
Networks
Cisco, Check Point
Palo Alto, Fortinet, F5
Private Cloud
NSX, Cisco ACI
Public Cloud
AWS, Azure
Microservices
Containers, VMs,
microservices
Tufin Value
Maximum Agility
& Security
with Network
Security Policy
Orchestration
Reduce complexity of managing hybrid
networks
Ensure continuous compliance with
security standards
Implement security changes in minutes
instead of days
And back to the story: the Real Results
38
• Removed
• 389 Network Objects
• 2000+ redundant rules deleted from the host providers firewalls
• 152 Security Rules
• 6 Services
• 20135 Device Configurations
• Results
• Visibility
• 365 Days Unused rules - 1372 of 2119
• 30 Days Unused rules - 1544 of 2119
• Confidence to remove rules without impacting service
• Reduce the threat landscape
• Improvement in the firewall service
Remember . . .
The network will always be complex and fragmented
Traditional networks, private cloud, public cloud, containers
Multi-vendor technologies
Distributed teams
The network of the future will be software-defined and automated
Security cannot be managed at scale without a centralized policy
39
ecurity
June 27, 2018
5 Clear Signs You Need
Security Policy Automation
Hadas Lahav | Product Management lead for automation
Maya Malevich | Director of Product Marketing, Tufin
Thank You
Mechanical Clock
500-900 AD
1335
Computer
500-900 AD
1335
1913
1943
Cloud
92% of enterprises use public cloud
today
38%
Source: RightScale State of the Cloud Report 2018
of enterprises state that Public
Cloud is a top priority for 2018
81%
of enterprises see security as a
top cloud challenge

More Related Content

What's hot

Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityJasonTrinhNguyenTruo
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05hoanv
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveAlgoSec
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsJim Gilsinn
 
Data Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the FittestData Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the FittestNet at Work
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officeIvanti
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya
 
Kaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT DirectorsKaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT DirectorsKaseya
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionJim Gilsinn
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
Company Profile
Company ProfileCompany Profile
Company Profile3SC World
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 

What's hot (20)

Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Data Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the FittestData Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the Fittest
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the office
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
 
Kaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT DirectorsKaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT Directors
 
Soc
SocSoc
Soc
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
We Bought Some Tools
We Bought Some ToolsWe Bought Some Tools
We Bought Some Tools
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 

Similar to 5 Clear Signs You Need Security Policy Automation

Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
Myths of validation
Myths of validationMyths of validation
Myths of validationJeff Thomas
 
IT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDIT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDVishnu Murali
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael JosephiuvoTechnologies
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISSaazan Shrestha
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessManageEngine
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesAlgoSec
 
How to build a change workflow process
How to build a change workflow processHow to build a change workflow process
How to build a change workflow processTufin
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAlgoSec
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfTapOffice
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014KBIZEAU
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxLokNathRegmi1
 
The Changing Role of IT: From Service Managers to Advisors
The Changing Role of IT:From Service Managers to AdvisorsThe Changing Role of IT:From Service Managers to Advisors
The Changing Role of IT: From Service Managers to AdvisorsJesse Stockall
 

Similar to 5 Clear Signs You Need Security Policy Automation (20)

Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
Myths of validation
Myths of validationMyths of validation
Myths of validation
 
IT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDIT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATED
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
 
How to build a change workflow process
How to build a change workflow processHow to build a change workflow process
How to build a change workflow process
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
The Changing Role of IT: From Service Managers to Advisors
The Changing Role of IT:From Service Managers to AdvisorsThe Changing Role of IT:From Service Managers to Advisors
The Changing Role of IT: From Service Managers to Advisors
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

5 Clear Signs You Need Security Policy Automation

  • 1. June 27, 2018 5 Clear Signs You Need Security Policy Automation Hadas Lahav | Product Management lead for automation Maya Malevich | Director of Product Marketing, Tufin
  • 2. History of Automation 500-900 AD 1335 1913 1943 Future ? Today
  • 3. Sometimes we miss the signs . . .
  • 4. Agenda • The five signs • Security policy automation • How to get started: Use Cases • Benefits • Next steps
  • 5. Number 1: Change processes are slow and manual • Unable to complete tasks on time • Spend too much time on mundane tasks • Unable to focus on what matters most • Team is inefficient and not meeting SLAs • You are understaffed and find it very hard to hire new people
  • 6. Number 2: Cloud First Initiatives 1. Zero visibility into cloud workloads 2. Network is unable to adapt and change with the environment, or at the same pace 3. You have not idea how to ensure changes are made according to security policy
  • 7. Number 3: Business is hopping around you 1. The business is asking you to move faster but you are worried about a breach 2. Unable to meet business requirements/SLA 3. Competition is doing better – releasing more features, faster 4. You have a Shadow IT problem
  • 8. Number 4: The hole is getting deeper 1. You have different business units submitting change requests, very frequently 2. Your rulebase is a mess • Shadowed rules • Redundant rules • Unused rules • Overly permissive 3. You can’t respond to security threats confidently 4. Errors and misconfigurations are common 5. Need to redo at least 20% of change requests
  • 9. Number 5: You can’t prove compliance 1. Unable to meet internal/external compliance standards 1. Failed an audit 2. Paid a big fine 2. Analyzing configurations has grown beyond the capacity of human computation 3. You can’t measure what you can’t see
  • 10. The need: A real life example 10 600 Requests/Changes modelled and assessed during 2017/18  18% (108) were rejected as not required  13% (65) required amending as partially implemented  Of which 8% (38) failed the implementation check  Lack of visibility of the Network Estate  Multiple Vendors / outsource partners  No single source of the truth  Fault Finding  3 sets of outsource partners on calls trying to identify issues performing traces  Limited Pre-change technical assessment  Manual assessment done by technical people  No Post Change validation and accountability  Passed to requestor to check things work They discovered problems . . .
  • 11. So Why Don’t we Automate? ● Cultural resistance/fear ● Lack of visibility ● It’s too hard/ too complex ● Have tried automating with scripts and failed ● Don’t know how to get started
  • 12. John F Kennedy automation does not need to be our enemy…
  • 13. The Call for Security Automation PRODUCTIVITY AGILITY SECURITY
  • 14. Why Automate Now? Why Security Policy?
  • 15. Enterprise Networks are Fragmented Private Cloud Firewalls from different vendors 1000s of routers and switches Public Cloud Microservices/ Containers
  • 16. Not just fragmented infrastructure - Fragmented processes Different teams handle different parts of the network
  • 17. The network will become even more complex and fragmented
  • 18. Security Policy • The network of the future will be software-defined and automated • Security cannot be managed at scale without a centralized policy
  • 19. Best Practices 1. Start small: Organizations are choosing to focus first on the easier areas of automation as they begin their automation journey 2. Automate on security policy changes: ESG Research shows only 1% of those surveyed found automation to be not at all important 19 Critical, 34% Very important, 52% Somewhat important, 13% Not at all important, 1%
  • 21. Group Modification Typical Scenario • Constant changes to user and firewall groups that are poorly documented • Manual change processes on multi vendor firewalls Problem: Manual Processes • Too long time to deploy • Increase maintenance workload • Leads to human errors Automated Group Object Modification to create and maintain groups simply and accurately
  • 22. Group Modification 22 1 Create a new group or update an existing group by submitting a Group Modification ticket in SecureChange 2 Design and Provision changes automatically using SecureChange Designer tool on Palo Alto, Cisco ASA, Fortinet and Check Point devices • Ensure full auditability via a dedicated report and ticket history
  • 23. Typical Scenario • Security policies degrade over time, resulting in rules which are fully shadowed or disabled, or rules with no hits Problem • Poorly maintained rulebase • Unused rules may increase the attack surface • Increases the complexity of firewall maintenance Automated Rule Decommissioning with complete change documentation Typical Use-Case 2: Rule Decommissioning
  • 24. 1 Identify obsolete & risky rules by searching the Policy Browser, and add them to a ticket Rule Decommissioning 24 2 Select action and workflow, and submit the ticket in SecureChange3 Design and Provision changes automatically using SecureChange Designer tool on Palo Alto, Cisco ASA, Fortinet and Check Point devices 4 Ensure full auditability via a dedicated report and ticket history
  • 25. Typical Scenario • Servers no longer in use but rules have not been removed from network Problem • Unused servers which are still defined in firewall policies weaken security posture and increase maintenance complexity • IT teams find it difficult to assess the impact of server removal on firewall policies in a complex network environment Automated Server Decommissioning to identify unused servers • Automatically analyze and understand impact of removal • Decommission servers and automatically update relevant rule pathways Typical Use-Case 2: Server Decommissioning
  • 26. Server Decommissioning 26 1 Open a Server Decommission ticket and perform impact analysis to understand where the server is being used 2 Design and Provision changes automatically using SecureChange Designer tool on Palo Alto, Cisco ASA, Fortinet and Check Point devices • Ensure full auditability via a dedicated report and ticket history
  • 27. Problems Solved by Security Policy Automation
  • 28. Skill Shortage and Automation 73% Source: Life and Times of Security Professionals, ESG and ISAA, Nov 2017 of survey respondents agree that new types of security automation technologies will have a positive impact on cybersecurity workload TIME ERRORS
  • 29. Compliance ● Compliance is a key driver in security budget ● Meet compliance mandates COMPLIANCE
  • 30. Eliminate Mistakes and Misconfigurations Automation of security tasks & processes efficient fast error-free Secured! + + =
  • 31. Security Policy Automation Benefits 31 AUTOMATION • Implement changes in minutes instead of days • Strengthen security and reduce the attack surface • Reduce complexity for multi-vendor environments • Improve audit readiness and achieve continuous compliance
  • 32. We are the Security Policy Company
  • 33. Network Security Policy Automation and Orchestration Security Policy Management Maturity Model Slow Risky Business Agility Security Visibility Cleanup Analysis & Design Application driven Zero touch
  • 34. Security Policy Orchestration Across the Next Generation Network
  • 35. Move Fast and Secure Things: Continuous Security • Security automation across DevOps lifecycle • Integration with CI/CD tools • Orchestrate 3rd party security services Dev Ops • Visibility of all microservice connections • Identify and protect vulnerable containers • Policy-based response to threats
  • 36. 36 Managing Your Security Policy . . . Everywhere A continuum from the macro to the micro Traditional Networks Cisco, Check Point Palo Alto, Fortinet, F5 Private Cloud NSX, Cisco ACI Public Cloud AWS, Azure Microservices Containers, VMs, microservices
  • 37. Tufin Value Maximum Agility & Security with Network Security Policy Orchestration Reduce complexity of managing hybrid networks Ensure continuous compliance with security standards Implement security changes in minutes instead of days
  • 38. And back to the story: the Real Results 38 • Removed • 389 Network Objects • 2000+ redundant rules deleted from the host providers firewalls • 152 Security Rules • 6 Services • 20135 Device Configurations • Results • Visibility • 365 Days Unused rules - 1372 of 2119 • 30 Days Unused rules - 1544 of 2119 • Confidence to remove rules without impacting service • Reduce the threat landscape • Improvement in the firewall service
  • 39. Remember . . . The network will always be complex and fragmented Traditional networks, private cloud, public cloud, containers Multi-vendor technologies Distributed teams The network of the future will be software-defined and automated Security cannot be managed at scale without a centralized policy 39
  • 40. ecurity June 27, 2018 5 Clear Signs You Need Security Policy Automation Hadas Lahav | Product Management lead for automation Maya Malevich | Director of Product Marketing, Tufin Thank You
  • 43. Cloud 92% of enterprises use public cloud today 38% Source: RightScale State of the Cloud Report 2018 of enterprises state that Public Cloud is a top priority for 2018 81% of enterprises see security as a top cloud challenge