SlideShare a Scribd company logo
The Policing Minister, Nick Hurd, spoke at the Fourth Digital Policing Summit on November 2018 during which he described now as the
pivotal time to address technical obstacles of existing police technology.
Policing is currently meeting modern policing challenges using legacy IT systems, but for how much longer? The policing landscape
remains a complex one with 43 police forces, each operating in silos, that lack integrated data exchanges. This lack of information flow
prevents reaping the benefits of efficiency enabled by automation. Additionally, Police Scotland, The Police Service of Northern Ireland,
and other national law enforcement agencies including the National Crime Agency, Border Force, British Transport Police and others are
in the same position – manually exerting themselves to achieve agility, yet increasingly obstructed by legacy IT and data silos.
Each police force and law enforcement agency is responsible for managing an extreme volume of personal data. Tasked with keeping
people and communities safe, each police force and law enforcement agency needs to share information across organisational boundaries
in order to be both efficient and effective.
In meeting those modern policing challenges, police forces continually seek greater mobility and agility. They must also grapple with
challenges caused by the explosion of digital evidence and requirements to collect, store, search against, and share structured and
unstructured data.
It is of note that after some deliberation, police forces are now adopting Cloud First Policy. This puts the police service on a data migration
journey from the physical network to the cloud, often using multiple vendors.
The increased complexity of the police’s IT infrastructure from Cloud First Policy cannot be ignored. Police forces already had a
multi-vendor, heterogenous environment with a mix of physical data centres with the more mature police forces adopting those cloud
environments. And new networking platforms further complicate the ability to deliver assured network connectivity when data is further
disparately distributed.
Some of the challenges in managing high volumes of personal data were brought to life recently by the announcement that the Information
Commissioners Officer are serving an Enforcement Notice on a large police force. The ICO made a stinging rebuke in November 2018 for
the multiple and serious data breaches relating to a ‘Gangs Matrix Database’. There are many other examples, where police forces lose
public confidence during similar security incidents that leak sensitive data – the very peoples’ data that they are meant to be protecting.
CIOs recognise correctly investing in network security is far less expensive than the cost of having a data breach from an organizational
perspective. For Chief Constables and Police and Crime Commissioners, improved network security is far better than losing public
confidence and experiencing reputational damage.
All police forces have a Senior Information Risk Officer (SIRO), typically performed by the Deputy Chief Constable due to the significance.
SIROs are highly aware of risks posed by cyberattacks and carry overall responsibility for information security.
Not only does network security need to be comprehensive, but it must also keep pace with developments in digital policing by effectively
connecting the complex police landscape.
Policing requires greater agility in many respects; from how members of the public contact the police to sharing data within and between
law enforcement organisations. Criminals are not hindered by policing boundaries and neither should the police. It is for this reason that
police forces are adjusting their Target Operating Models to address the disruptive digital challenges of modern policing.
A digitally transformed police service requires a network that is agile. Waiting for network connectivity, such as firewall changes, prevents
police forces from ever delivering swift protective responses.
White Paper
Network Security Policy Automation and Orchestration
for Policing
www.tufin.com
www.tufin.com
The complexity of networks is increasing, and the manual configuration of policy changes to multiple firewalls, locally, regionally, and
nationally is harrowing and time consuming. Data breaches prominently displayed on newspaper headlines are likely to increasingly
derail police forces and prevent efficient and effective policing.
The National Enabling Programme and police force IT departments therefore need to achieve the balance between agility and security.
Network security policy management is the logical answer for enabling policing with the needed agility, and compliments their legacy and
new technology through automation. Critical security changes are orchestrated in minutes rather than days, which saves valuable time for
IT departments. Gartner research has noted the benefits of effective network orchestration and automation which improves management
capabilities and operational efficiency. Other benefits of automation include increased application availability, robustness and stability
(Simon Richard, Gartner research, Effective Network Orchestration Starts by Automating Provisioning, 31 August 2015)
So this beckons the question, how do police forces and other law enforcement agencies turn network security into an enablement solution
to ensure policing effectiveness?
This paper lists the five critical steps of adopting network security automation and reviews how to address the challenges of increasing
agility and enabling the business. evolve your network security processes into agility enablement.
Step 1: Gain Visibility into the Business Requirements
Applications are required to support core policing. Depending on the size and nature of the police force, there can be tens or hundreds
of applications connected across physical network and cloud. To manage the security and ensure connectivity of these applications, the
IT teams require visibility into what the applications are, their dependencies, the criticality of each application, the services required for
access, and the application owner. Without this information, it’s impossible to deliver connectivity and ensure ongoing connectivity despite
changes to the network that may delay application launches and ongoing connectivity.
Step 2: Model the Network Topology
The next step is to have a very clear model of the network topology—what network security devices exist, where they are (i.e., specific IP
addresses), security groups (in the SDN and public cloud), how traffic routes throughout this network, the connectivity between various
points, and where connectivity drops. This model must be dynamic because the network is subject to constant change. This connectivity
information is critical because without it, how would anyone know how or where to make changes?
Step 3: Define the Organisational Security Policy
Each police force or law enforcement agency must define a comprehensive organisational security policy aligned with the external
regulatory mandates and industry standards (e.g., PNN, PCI DSS, SOX, NERC CIP, and of course GDPR); internal enterprise-wide
governance requirements; and general best practices that the enterprise observes. This security policy should define what is and isn’t
allowed for connectivity between different zones, or segments, of the network. For example, PCI DSS specifies that the cardholder
data environment must be isolated from all other network segments, unless you want the entire network to be subjected to PCI DSS
compliance. Segmenting your network and determining the permissible service types between them dictates what future connections are
permitted into the cardholder data environment.
Step 4: Create a Well-Defined, Documented Change Process
All police forces already have processes in place available through workflows in their ticketing system, and in many cases based on
the ITIL best practice framework. There are many products that manage changes , but none of them provide analysis, provisioning and
documentation of network security policy changes. In order to automate network security access requests, the change process needs to
be defined and integrated with the ITSM solution to ensure comprehensive oversight and governance of IT service management.
Step 5: Automate the Process
Automation eliminates tedious tasks and helps humans make better decisions. ‘What-if’ analysis is often used to simulate planned security
changes and assess if the expected results don’t disrupt the broader network connectivity or violate compliance before provisioning the
needed changes. Automating risk and connectivity analysis ensures that the security team only approves changes that violate the policy
and empowers the networking team to process change requests rapidly. Policy-based automation helps implement changes in minutes
instead of days accurately and securely, and ensures full documentation of every access request.
www.tufin.com
Ready. Set. Automate!
Once the police force has the below five achievements completed, they can then leverage automation to maximize agility and security in
a complex, hybrid network:
1. Understands its business needs
2. Has an accurate live model of network topology
3. Creates a documented security policy
4. Agrees to a formal process for processing change requests
5. Automate the process with baked-in ‘what-if’ analysis
The Tufin Orchestration Suite Delivers Network Security Policy Management
The Tufin Orchestration Suite™ fills this gap by automating the network security change process, providing police force SIROs with the
assurance that personal data is secure across physical network and hybrid cloud platforms. The suite abstracts the network infrastructure
and the business applications to analyse the risk of changes and then provisions them once approved. The APIs enable consistent
communication with other important applications of the computing environment, such as an IT service management system as seen in
the image below.
Tufin takes a policy-based approach to automate security change requests. Automation boosts security for police forces and other law
enforcement agencies, facilitates and increases agility, and ensures efficiency and effectiveness. From the application to the firewall, Tufin
enables the effective enforcement of security policy management through orchestration across physical networks and cloud platforms,
reducing the attack surface and ensuring the public confidence in policing.

More Related Content

What's hot

PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
Annelore van der Lint
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
Ulf Mattsson
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
ipoque
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
Ulf Mattsson
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
Clifton M. Hasegawa & Associates, LLC
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
automatskicorporation
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
aap3 IT Recruitment
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
Ulf Mattsson
 
Smart grid
Smart gridSmart grid
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
Ulf Mattsson
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
Ulf Mattsson
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
Ulf Mattsson
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
IT Strategy Group
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
Ulf Mattsson
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
Echoworx
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
Cybersecurity regulation will be challenging
Cybersecurity regulation will be challengingCybersecurity regulation will be challenging
Cybersecurity regulation will be challenging
Joe Orlando
 

What's hot (20)

PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Smart grid
Smart gridSmart grid
Smart grid
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Cybersecurity regulation will be challenging
Cybersecurity regulation will be challengingCybersecurity regulation will be challenging
Cybersecurity regulation will be challenging
 

Similar to Tufin white paper Network Security Policy Automation and Orchestration for Policing

Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
Vanya Vladeva
 
Digital policing applications and services catalogue
Digital policing applications and services catalogueDigital policing applications and services catalogue
Digital policing applications and services catalogueRobin Brooke
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
Shreyas Satpute
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
GAURAV. H .TANDON
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
AdilsonSuende
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
SteveAtHPE
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
Paraben Corporation
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
James '​-- Mckinlay
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
International Journal of Science and Research (IJSR)
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
IJECEIAES
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
Tony DeGonia (LION)
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
jiricejka
 

Similar to Tufin white paper Network Security Policy Automation and Orchestration for Policing (20)

Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Digital policing applications and services catalogue
Digital policing applications and services catalogueDigital policing applications and services catalogue
Digital policing applications and services catalogue
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
 

Recently uploaded

一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
Mohammed325561
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 

Recently uploaded (20)

一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 

Tufin white paper Network Security Policy Automation and Orchestration for Policing

  • 1. The Policing Minister, Nick Hurd, spoke at the Fourth Digital Policing Summit on November 2018 during which he described now as the pivotal time to address technical obstacles of existing police technology. Policing is currently meeting modern policing challenges using legacy IT systems, but for how much longer? The policing landscape remains a complex one with 43 police forces, each operating in silos, that lack integrated data exchanges. This lack of information flow prevents reaping the benefits of efficiency enabled by automation. Additionally, Police Scotland, The Police Service of Northern Ireland, and other national law enforcement agencies including the National Crime Agency, Border Force, British Transport Police and others are in the same position – manually exerting themselves to achieve agility, yet increasingly obstructed by legacy IT and data silos. Each police force and law enforcement agency is responsible for managing an extreme volume of personal data. Tasked with keeping people and communities safe, each police force and law enforcement agency needs to share information across organisational boundaries in order to be both efficient and effective. In meeting those modern policing challenges, police forces continually seek greater mobility and agility. They must also grapple with challenges caused by the explosion of digital evidence and requirements to collect, store, search against, and share structured and unstructured data. It is of note that after some deliberation, police forces are now adopting Cloud First Policy. This puts the police service on a data migration journey from the physical network to the cloud, often using multiple vendors. The increased complexity of the police’s IT infrastructure from Cloud First Policy cannot be ignored. Police forces already had a multi-vendor, heterogenous environment with a mix of physical data centres with the more mature police forces adopting those cloud environments. And new networking platforms further complicate the ability to deliver assured network connectivity when data is further disparately distributed. Some of the challenges in managing high volumes of personal data were brought to life recently by the announcement that the Information Commissioners Officer are serving an Enforcement Notice on a large police force. The ICO made a stinging rebuke in November 2018 for the multiple and serious data breaches relating to a ‘Gangs Matrix Database’. There are many other examples, where police forces lose public confidence during similar security incidents that leak sensitive data – the very peoples’ data that they are meant to be protecting. CIOs recognise correctly investing in network security is far less expensive than the cost of having a data breach from an organizational perspective. For Chief Constables and Police and Crime Commissioners, improved network security is far better than losing public confidence and experiencing reputational damage. All police forces have a Senior Information Risk Officer (SIRO), typically performed by the Deputy Chief Constable due to the significance. SIROs are highly aware of risks posed by cyberattacks and carry overall responsibility for information security. Not only does network security need to be comprehensive, but it must also keep pace with developments in digital policing by effectively connecting the complex police landscape. Policing requires greater agility in many respects; from how members of the public contact the police to sharing data within and between law enforcement organisations. Criminals are not hindered by policing boundaries and neither should the police. It is for this reason that police forces are adjusting their Target Operating Models to address the disruptive digital challenges of modern policing. A digitally transformed police service requires a network that is agile. Waiting for network connectivity, such as firewall changes, prevents police forces from ever delivering swift protective responses. White Paper Network Security Policy Automation and Orchestration for Policing www.tufin.com
  • 2. www.tufin.com The complexity of networks is increasing, and the manual configuration of policy changes to multiple firewalls, locally, regionally, and nationally is harrowing and time consuming. Data breaches prominently displayed on newspaper headlines are likely to increasingly derail police forces and prevent efficient and effective policing. The National Enabling Programme and police force IT departments therefore need to achieve the balance between agility and security. Network security policy management is the logical answer for enabling policing with the needed agility, and compliments their legacy and new technology through automation. Critical security changes are orchestrated in minutes rather than days, which saves valuable time for IT departments. Gartner research has noted the benefits of effective network orchestration and automation which improves management capabilities and operational efficiency. Other benefits of automation include increased application availability, robustness and stability (Simon Richard, Gartner research, Effective Network Orchestration Starts by Automating Provisioning, 31 August 2015) So this beckons the question, how do police forces and other law enforcement agencies turn network security into an enablement solution to ensure policing effectiveness? This paper lists the five critical steps of adopting network security automation and reviews how to address the challenges of increasing agility and enabling the business. evolve your network security processes into agility enablement. Step 1: Gain Visibility into the Business Requirements Applications are required to support core policing. Depending on the size and nature of the police force, there can be tens or hundreds of applications connected across physical network and cloud. To manage the security and ensure connectivity of these applications, the IT teams require visibility into what the applications are, their dependencies, the criticality of each application, the services required for access, and the application owner. Without this information, it’s impossible to deliver connectivity and ensure ongoing connectivity despite changes to the network that may delay application launches and ongoing connectivity. Step 2: Model the Network Topology The next step is to have a very clear model of the network topology—what network security devices exist, where they are (i.e., specific IP addresses), security groups (in the SDN and public cloud), how traffic routes throughout this network, the connectivity between various points, and where connectivity drops. This model must be dynamic because the network is subject to constant change. This connectivity information is critical because without it, how would anyone know how or where to make changes? Step 3: Define the Organisational Security Policy Each police force or law enforcement agency must define a comprehensive organisational security policy aligned with the external regulatory mandates and industry standards (e.g., PNN, PCI DSS, SOX, NERC CIP, and of course GDPR); internal enterprise-wide governance requirements; and general best practices that the enterprise observes. This security policy should define what is and isn’t allowed for connectivity between different zones, or segments, of the network. For example, PCI DSS specifies that the cardholder data environment must be isolated from all other network segments, unless you want the entire network to be subjected to PCI DSS compliance. Segmenting your network and determining the permissible service types between them dictates what future connections are permitted into the cardholder data environment. Step 4: Create a Well-Defined, Documented Change Process All police forces already have processes in place available through workflows in their ticketing system, and in many cases based on the ITIL best practice framework. There are many products that manage changes , but none of them provide analysis, provisioning and documentation of network security policy changes. In order to automate network security access requests, the change process needs to be defined and integrated with the ITSM solution to ensure comprehensive oversight and governance of IT service management. Step 5: Automate the Process Automation eliminates tedious tasks and helps humans make better decisions. ‘What-if’ analysis is often used to simulate planned security changes and assess if the expected results don’t disrupt the broader network connectivity or violate compliance before provisioning the needed changes. Automating risk and connectivity analysis ensures that the security team only approves changes that violate the policy and empowers the networking team to process change requests rapidly. Policy-based automation helps implement changes in minutes instead of days accurately and securely, and ensures full documentation of every access request.
  • 3. www.tufin.com Ready. Set. Automate! Once the police force has the below five achievements completed, they can then leverage automation to maximize agility and security in a complex, hybrid network: 1. Understands its business needs 2. Has an accurate live model of network topology 3. Creates a documented security policy 4. Agrees to a formal process for processing change requests 5. Automate the process with baked-in ‘what-if’ analysis The Tufin Orchestration Suite Delivers Network Security Policy Management The Tufin Orchestration Suite™ fills this gap by automating the network security change process, providing police force SIROs with the assurance that personal data is secure across physical network and hybrid cloud platforms. The suite abstracts the network infrastructure and the business applications to analyse the risk of changes and then provisions them once approved. The APIs enable consistent communication with other important applications of the computing environment, such as an IT service management system as seen in the image below. Tufin takes a policy-based approach to automate security change requests. Automation boosts security for police forces and other law enforcement agencies, facilitates and increases agility, and ensures efficiency and effectiveness. From the application to the firewall, Tufin enables the effective enforcement of security policy management through orchestration across physical networks and cloud platforms, reducing the attack surface and ensuring the public confidence in policing.