The Security Policy Management
Maturity Model
Our Speakers
Eric Ogren
Principal Analyst
The Ogren Group

Nimmy Reichenberg
VP Strategy
AlgoSec

2
We Need to Evolve!
Complexity

4
Modern Threats
Speed of Business
The Security Management Maturity Model
Level 4 - Visionary

Level 3 - Advanced
Level 2 - Emerging
Level 1 - Initial

7
Using the Maturity Model

Assess

Evaluate
Implement
8
Poll
9
Level 1 - Initial
• Limited understanding of why each rule is in place
• Change management is manual; many changes must
be redone
• Limited visibility of impact to network traffic
• Time-consuming audits
• Rules are rarely deleted for fear of breaking something
• Manual risk analysis of the firewall policy
10
Recommendations for Level 1
1. Review (or create) documentation for firewall rules
2. Get an accurate picture of your network traffic so
you understand what your policy is actually doing
3. Define your ideal change management process
4. Establish regular projects to clean up firewall and
router rules and ACLs
5. Review risk analysis and compliance processes

6. Assess benefits of automation
11
Level 2 - Emerging
• Automated monitoring and alerting of policy changes
• Real-time, up-to-date topology visibility

• Automated compliance reporting
• Automated policy optimization and risk analysis

• No overly permissive rules (E.g. ANY)
• Change management still manual and error-prone
with teams working in silos
12
Recommendations for Level 2
1. Make sure security and network teams are aligned
and agree on change management processes

2. Measure the time required for each step of a
change request to identify bottlenecks
3. Conduct reconciliation between requests and
changes made to identify out-of-process changes
4. Assess the value of automation as part of a
firewall- and network-aware change process
13
Level 3 - Advanced
• Automated change process improves business agility
• Continuous compliance
• Out-of-process changes are discovered and “already
works” change requests are automatically closed
• Basic documentation and limited visibility of
application connectivity needs (E.g. spreadsheets)
• Poor communications with business stakeholders and
application owners
14
Recommendations for Level 3
1. Review processes for documenting application connectivity
needs
2. Assess gaps between application and network teams relating
to the security and network infrastructure
3. Review processes for decommissioning applications and
related unused firewall rules
4. Examine options for making business owners “own the risk”
and vulnerabilities in their applications
5. Assess tools which provide application-centric approaches to
managing the network security policy
15
Level 4 - Visionary
• Fast and efficient security provisioning of business
applications
• Application, security and operations teams are
aligned
• Secure decommissioning of applications; removing
rules no longer in use
• No application outages due to firewall
misconfigurations
• View of risk from the application perspective
16
If you have made this far you should enjoy…
1. Improved application availability – even
during a data center migration
2. Faster service delivery
3. Alignment across IT, security and the
business
4. Tighter security policies to improve defense
against cyber-attacks
5. More time, resources and budget to focus
on strategic initiatives
17
Poll
18
The AlgoSec Security
Management Suite

Confidentia
19
l
Managing Security at the Speed of Business
Application Owners

Network Operations

Security

AlgoSec Security Management Suite

Faster Security
Provisioning for
Business
Applications

Business
Applications

Align Teams for
Improved Agility
and Accountability

Gain Total
Visibility and
Control of your
Security Policy

Security
Infrastructure
20
The AlgoSec Suite
Application Owners

Network Operations

Security

AlgoSec Security Management Suite

BusinessFlow

Firewall
Analyzer

Business Application
Connectivity Mgmt

Business
Applications

FireFlow
Security Policy
Change Automation

Security Policy
Analysis & Audit

Security
Infrastructure
21
Q&A and Next Steps
Download the Security Policy
Management Maturity Model @
www.algosec.com/maturitymodel

Download the Security Change
Management ebook @
www.algosec.com/securitychanges_ebook

Evaluate the AlgoSec Security
Management Suite @
www.algosec.com/eval
22
Managing Security at the Speed of Business
www.AlgoSec.com

Connect with AlgoSec on:

The Security Policy Management Maturity Model: How to Move Up the Curve

  • 1.
    The Security PolicyManagement Maturity Model
  • 2.
    Our Speakers Eric Ogren PrincipalAnalyst The Ogren Group Nimmy Reichenberg VP Strategy AlgoSec 2
  • 3.
    We Need toEvolve!
  • 4.
  • 5.
  • 6.
  • 7.
    The Security ManagementMaturity Model Level 4 - Visionary Level 3 - Advanced Level 2 - Emerging Level 1 - Initial 7
  • 8.
    Using the MaturityModel Assess Evaluate Implement 8
  • 9.
  • 10.
    Level 1 -Initial • Limited understanding of why each rule is in place • Change management is manual; many changes must be redone • Limited visibility of impact to network traffic • Time-consuming audits • Rules are rarely deleted for fear of breaking something • Manual risk analysis of the firewall policy 10
  • 11.
    Recommendations for Level1 1. Review (or create) documentation for firewall rules 2. Get an accurate picture of your network traffic so you understand what your policy is actually doing 3. Define your ideal change management process 4. Establish regular projects to clean up firewall and router rules and ACLs 5. Review risk analysis and compliance processes 6. Assess benefits of automation 11
  • 12.
    Level 2 -Emerging • Automated monitoring and alerting of policy changes • Real-time, up-to-date topology visibility • Automated compliance reporting • Automated policy optimization and risk analysis • No overly permissive rules (E.g. ANY) • Change management still manual and error-prone with teams working in silos 12
  • 13.
    Recommendations for Level2 1. Make sure security and network teams are aligned and agree on change management processes 2. Measure the time required for each step of a change request to identify bottlenecks 3. Conduct reconciliation between requests and changes made to identify out-of-process changes 4. Assess the value of automation as part of a firewall- and network-aware change process 13
  • 14.
    Level 3 -Advanced • Automated change process improves business agility • Continuous compliance • Out-of-process changes are discovered and “already works” change requests are automatically closed • Basic documentation and limited visibility of application connectivity needs (E.g. spreadsheets) • Poor communications with business stakeholders and application owners 14
  • 15.
    Recommendations for Level3 1. Review processes for documenting application connectivity needs 2. Assess gaps between application and network teams relating to the security and network infrastructure 3. Review processes for decommissioning applications and related unused firewall rules 4. Examine options for making business owners “own the risk” and vulnerabilities in their applications 5. Assess tools which provide application-centric approaches to managing the network security policy 15
  • 16.
    Level 4 -Visionary • Fast and efficient security provisioning of business applications • Application, security and operations teams are aligned • Secure decommissioning of applications; removing rules no longer in use • No application outages due to firewall misconfigurations • View of risk from the application perspective 16
  • 17.
    If you havemade this far you should enjoy… 1. Improved application availability – even during a data center migration 2. Faster service delivery 3. Alignment across IT, security and the business 4. Tighter security policies to improve defense against cyber-attacks 5. More time, resources and budget to focus on strategic initiatives 17
  • 18.
  • 19.
    The AlgoSec Security ManagementSuite Confidentia 19 l
  • 20.
    Managing Security atthe Speed of Business Application Owners Network Operations Security AlgoSec Security Management Suite Faster Security Provisioning for Business Applications Business Applications Align Teams for Improved Agility and Accountability Gain Total Visibility and Control of your Security Policy Security Infrastructure 20
  • 21.
    The AlgoSec Suite ApplicationOwners Network Operations Security AlgoSec Security Management Suite BusinessFlow Firewall Analyzer Business Application Connectivity Mgmt Business Applications FireFlow Security Policy Change Automation Security Policy Analysis & Audit Security Infrastructure 21
  • 22.
    Q&A and NextSteps Download the Security Policy Management Maturity Model @ www.algosec.com/maturitymodel Download the Security Change Management ebook @ www.algosec.com/securitychanges_ebook Evaluate the AlgoSec Security Management Suite @ www.algosec.com/eval 22
  • 23.
    Managing Security atthe Speed of Business www.AlgoSec.com Connect with AlgoSec on: