10
SecureTrackFirewall Operations Management, Auditing & Compliance March, 2012 www.tufin.com

GDS International - Next - Generation - Security - Summit - Europe - 2

Embed Size (px)

DESCRIPTION

Tufin Firewall Operations Management Whitepapaer

Citation preview

Page 1: GDS International - Next - Generation - Security - Summit - Europe - 2

SecureTrack™ Firewall Operations Management, Auditing & Compliance

March, 2012

www.tufin.com

Page 2: GDS International - Next - Generation - Security - Summit - Europe - 2

Firewall Operations Management 2/10

Table of Contents

Introduction ................................................................................................... 3

Comprehensive View of Firewall Policy ...................................................... 4

Configuration Change Management ........................................................... 4

Security Policy Optimization and Cleanup ................................................. 5

Risk Management ......................................................................................... 6

Network Topology Intelligence .................................................................... 6

Rule Documentation and Recertification .................................................... 7

Auditing and Continuous Compliance ........................................................ 7

Automatic Security Policy Generation ........................................................ 8

Compliance with Best Practices .................................................................. 9

Scalable, Distributed Deployment Architecture and Multi-Tenancy ........ 9

Firewall Operations Management: The Automated Solution .................... 9

Page 3: GDS International - Next - Generation - Security - Summit - Europe - 2

Firewall Operations Management 3/10

Introduction

Managing network security for an organization or a service provider has become a highly complex operation involving dozens or even hundreds of firewalls and routers. Multiple sites and teams, different hardware and software vendors – all of these factors make it virtually impossible to maintain an accurate, airtight security policy on every device. At the same time, internal security policies have become more rigorous, and organizations need to comply with a growing body of industry and government regulations.

To make sure that security standards are being met, most organizations rely on periodic audits – a process involving days of manual, painstaking effort. In addition to the tremendous investment of time and resources, relying on audits is a reactive approach to network security that can leave threats undetected for months at a time.

Today’s security operations teams urgently need a management solution that can proactively assure network security and achieve Continuous Compliance with standards while automating labor-intensive day-to-day tasks. In practical terms, firewall operations teams need:

Central, cross-vendor management starting with a top-down view of all firewalls, routers and switches in the organization – including next-generation firewalls

Change management to ensure that every change to security policy is accountable and in accordance with corporate standards

Proactive risk analysis and business continuity management to evaluate the impact of every configuration change and ensure Continuous Compliance with standards

Policy optimization and cleanup to eliminate security loopholes, improve firewall performance, and reduce hardware costs

Network topology intelligence to visually analyze the access path between any source and destination

Rule documentation that enables you to manage rule ownership, expiration and recertification.

Automated security audits to efficiently comply with corporate policies as well as industry and government regulations

Automatic security policy generation to enable rapid deployment of new firewalls without disrupting business continuity or resorting to permissive rules

Alignment with best practices from vendors and security industry veterans

Scalable support for large enterprises and datacenters including distributed deployment, multiple device domains and role-based management.

Tufin SecureTrack™ enables security operations teams to dramatically reduce risk while increasing compliance and efficiency. With a powerful set of real-time and analytical tools, SecureTrack tackles the practical challenges that operations teams face every day when it comes to managing firewalls, routers and switches. This paper takes a closer look at each of the key requirements in security operations management and explains how SecureTrack enables companies to eliminate potential threats, lower costs, and achieve their strategic security objectives.

Page 4: GDS International - Next - Generation - Security - Summit - Europe - 2

Firewall Operations Management 4/10

Comprehensive View of Firewall Policy

Enterprises and service providers manage dozens, if not hundreds, of individual network security devices including network-layer firewalls, next-generation, application-layer firewalls, routers and switches with ACLs. Each device has its own policy - a complex set of rules defining the access privileges and restrictions for specific users and services. Today, administrators lack a unified top-down view of all of their security policies from various vendors, and need to individually monitor each piece of the puzzle.

Tufin SecureTrack provides a convenient, top-down view of all security policies (rule bases and ACLs) in the organization, even if they are from multiple vendors. You can view the current configuration as well as historical views and snapshots. Each policy is displayed using the vendor’s native layout and conventions. SecureTrack makes it simple to visually compare and review devices. For example, you can analyze a side-by-side view of the same firewall at two different points in time, and you can compare the settings of different firewalls in a variety of views and reports.

SecureTrack’s dashboard and interactive browsers enable you to immediate assess your overall security posture and to drill down for more information in order to analyze and remediate threats.

On or off-site, SecureTrack enables you to centrally manage alerts and notifications and generate reports for all of your firewalls and related security infrastructure. Since it is easy to learn and use, within minutes you can integrate SecureTrack into your network environment and start real-time monitoring.

In addition to the list of vendors currently supported by SecureTrack, the Tufin Open Platform (TOP) enables enterprises and integrators to easily extend the platform and support additional vendors and infrastructure components through simple plugins.

Click here for a complete list of supported devices.

Configuration Change Management

Organizations are constantly in motion. So implementing a corporate security policy is not a one-shot deal. Every day, configuration changes are made in response to user requests for network access, security threats and changes to the network structure. Monitoring, tracking and analyzing these configuration changes is probably the biggest challenge facing firewall administrators today. And the problem is not limited to rule bases and ACLs. Changes to the configuration and performance of the firewall operating system or firmware also directly

Page 5: GDS International - Next - Generation - Security - Summit - Europe - 2

Firewall Operations Management 5/10

impact security and business continuity, yet they are difficult to track with conventional methods.

Tufin SecureTrack continuously monitors and keeps track of every security configuration change including changes to rules and network objects such as hosts and services. Comprehensive change reports include all firewalls and vendors, using the vendor’s native conventions – for example, field names and colors. SecureTrack offers a variety of customizable change reports as well as comparisons of different firewalls, or different historical snapshots. Reports can be sliced by firewall, by rule, by object, or by the type of change.

Full accountability is assured since each change is stored along with the administrator’s name, the time, and the server where the change originated. SecureTrack makes it possible to determine who made a change with a simple query, rather than searching through numerous log files for the needle in the haystack.

SecureTrack also integrates with leading ticketing systems so that changes can be tracked from the original request through approvals to implementation. Each change in a SecureTrack report includes a link to the relevant ticket so that you can automatically launch the ticket for more information.

Using real-time alerts, SecureTrack sends e-mail to designated administrators in response to every change that may conflict with corporate security policy. Rather than wait for the next audit, SecureTrack empowers you to proactively prevent security risks before they actually arise. Alerts are also useful for ongoing management – even when you are off site, SecureTrack alerts can inform you of any or all changes via email.

Security Policy Optimization and Cleanup

As thousands of tickets are processed by the security team, and organizational security objectives evolve over time, the underlying policies and rule bases become very large, intricate and complex. In fact, many of the rules and objects in a typical firewall rule base are obsolete. These unused rules represent a potential security hole and should be eliminated. Yet administrators do not have an easy way of identifying these rules with standard administration tools.

In addition to security risks, a poorly maintained rule base can have a major impact on performance. The entire rule base is parsed from top to bottom with every network connection, and as the rule base grows, hardware requirements also increase.

SecureTrack analyzes the actual usage of policy rules and labels each rule as heavily used, moderately used, or unused. SecureTrack also analyzes object usage within each rule, indicating specific network objects and services that are no longer in use. It is advisable to review every unused rule and object, and remove those that are not necessary and may represent a security risk.

To improve device performance, SecureTrack makes recommendations regarding the position of specific rules – placing the heavily used rules at the top of the rule base and moving the least-used rules to the bottom. SecureTrack also indicates rule shadowing – places where rules overlap, or effectively “hide” other rules – so that you can re-position rules intelligently.

You can view the latest optimization recommendations in the SecureTrack dashboard and Clean-Up browser or generate a customized report at any time.

Page 6: GDS International - Next - Generation - Security - Summit - Europe - 2

Firewall Operations Management 6/10

Risk Management

The implications of a security configuration error can be severe – from a breach to network downtime, or even a network service interruption. Therefore, it is essential to analyze the impact of every change before it is implemented in the production environment. The same is true for the firewall gateway operating system, where routine system maintenance can expose vulnerabilities or even disrupt business.

In addition, security managers must be able to assess risk and vulnerability at any given time – for all relevant network security devices. The challenge is greatest in distributed organizations with multiple teams. Inevitably, different teams develop their own standards and working methodologies. To ensure that everybody is successfully implementing security guidelines, organizations need to implement automated solutions that can evaluate risk and compliance at all times.

To manage risk and ensure business continuity, SecureTrack uses a multi-step approach:

Security administrators define the organization’s security compliance policy for mission critical and risky services within SecureTrack. SecureTrack automatically compares every change that is made to the firewall, router or switch configuration and sends out a real-time alert in the case of a violation to the organization’s compliance policy. This capability is firewall vendor agnostic and implemented transparently in heterogeneous firewalls environments.

Before implementing a change, administrators can use SecureTrack’s Security Policy Analysis to simulate the change on the rule base and identify possible conflicts or violations. This pro-active risk analysis tool can save hours of painstaking, manual rule base review.

The SecureTrack dashboard and the interactive Risk browser always show the current level of risk along with a prioritized list of risk factors, so that you can investigate and remediate as soon as possible.

The Security Risk Report summarizes the current risk posture and calculates your Security Score. The report can be run at the organizational level or per gateway, and indicates risk trends in addition to the current state. To determine the Security Score, the report uses your compliance policies as well as a group of pre-defined risk factors culled from leading industry standards. You can set your own priorities and customize the report to exclude specific policies, risk factors or even rules that cause false positive violations.

Network Topology Intelligence

Given the size and complexity of today’s networks, it is not easy to maintain a clear picture of all of its devices and zones. When faced with a network access request from a user, or a change request from IT, it can take time to understand which firewalls and network components are involved.

SecureTrack discovers an organizations’ network topology and provides security administrators with a dynamic, visual map. The map, which is continuously updated in response to network changes, identifies firewalls, routers and network zones such as the DMZ. SecureTrack supports very large maps and enables you to add unmonitored routers in order to create the most complete picture.

Page 7: GDS International - Next - Generation - Security - Summit - Europe - 2

Firewall Operations Management 7/10

Network Topology Intelligence is an integral part of many SecureTrack and SecureChange features including policy analysis, compliance and security risk reports, and the Policy Change Advisor. It automatically identifies the devices and zones that are relevant for an access requests making it easier for you to analyze, modify and report on security policies.

Rule Documentation and Recertification

A key best practice for security policies is to periodically review each rule and remove the ones that are no longer required. Since policies regularly contain hundreds of rules, and there are often several administrators making changes, it is optimal to document each rule as it is created, and to assign an expiration date.

Among firewall, router and switch vendors, the ability to document rules and set expiration dates is handled to varying extents – or not at all – so it is important to be able to manage rule ownership, expiration and recertification centrally.

With SecureTrack, you can continuously weed out rules that are no longer needed and prevent rule bases from growing out of control. You can document each rule, identify the technical and business owners, and indicate an expiration date upon which the rule must be reviewed. At any time, you can sort and filter rules according to expiration date and/or owner and recertify, or remove them, as needed. You can also define scheduled reports and alerts to proactively stay on top of rule status at all times.

Rule documentation is a valuable tool for justification of rules as required by certain audits such as PCI DSS.

Auditing and Continuous Compliance

Companies now understand the business impact of network security and are demanding a high level of transparency and accountability from network operations teams. In addition, more and more organizations need to conform to government and industry standards such as PCI DSS, NERC and SOX.

To meet these increasingly rigorous standards, you need the ability to efficiently perform periodic audits. Owing to the size and dynamic nature of firewall rule bases, it is extremely time-consuming to do this manually, even for an expert. you need an automated audit process that can be configured to meet the specific requirements of both corporate and regulatory standards.

To hold individuals accountable for their actions, you need to maintain an accurate audit trail of all security policy and operating system changes. It is preferable that the audit trail come

Page 8: GDS International - Next - Generation - Security - Summit - Europe - 2

Firewall Operations Management 8/10

from an objective third party or automatic logging tool. Furthermore, you need to enforce and demonstrate a separation of duties designed to ensure that all changes are approved and monitored properly.

But auditing is not enough. The true goal of security regulations is Continuous Compliance. So in between audits, it is essential to continuously monitor every single change, to assess risks and to mitigate threats before they materialize.

SecureTrack provides automatic audit reports that test current firewall configuration against your corporate security policy as well as a configurable checklist of standards. Along with a list of violations, Tufin’s audit reports provide information on how to resolve or mitigate the infraction. Specialized reports, such as the PCI DSS Audit and the Cisco Device Configuration Report (DCR), are already designed according to the requirements of the industry standard. Audit reports can be scheduled for automatic, periodic execution and mailed to all relevant security officers.

SecureTrack supports periodic audits with continuous change tracking and a comprehensive audit trail that provides full accountability and demonstrates implementation of a separation of duties. Change reports can be generated at any time to show the configuration changes that were made both to the rule base and to the firewall operating system.

Since SecureTrack issues real-time alerts any time a configuration change violates corporate policy, all security threats can be addressed immediately. This transforms the periodic audit into the reporting process it is meant to be, and enables you to deliver Continuous Compliance to your organization.

Automatic Security Policy Generation

Network security teams are frequently asked to secure unrestricted network segments – for example, between branch offices or merged companies – or to tighten up permissive firewall policies. This is very difficult to achieve without accidentally disrupting critical business services. Through labor-intensive manual log inspection, administrators try to identify legitimate business traffic and create a rule set that will meet both security and business objectives. But given the complexity of network traffic today, this process is not only tedious and error-prone – it is also not very effective. As a result, companies often deploy firewalls with permissive ANY rules that do little to fulfill their security objectives. Network security teams need an automatic solution for defining new firewall policies and tightening up permissive ones that can reduce deployment times and ensure business continuity.

With SecureTrack’s Automatic Policy Generator™ (APG), you can automatically generate a new, robust firewall policy based on a thorough analysis of current network traffic. APG creates a rule base that is not too permissive, is optimized for high performance and organized for easy management and maintenance. Fast and efficient, APG processes thousands of logs to create a new rule base within minutes.

APG also provides security professionals with a powerful tool for tightening existing firewalls, re-building complex, heavy rule sets, and analyzing the rule bases of firewalls inherited from other organizations. APG evaluates the permissiveness of each rule and provides concrete recommendations on how to improve them. Using an interactive graph, you can set the balance between the degree of permissiveness and the number of rules that is generated. APG is powered by Tufin’s patent-pending Permissive Rule Analysis technology. For more information read the APG Whitepaper.

Page 9: GDS International - Next - Generation - Security - Summit - Europe - 2

Firewall Operations Management 9/10

Compliance with Best Practices

Over the years, security best practices have evolved that enable organizations to manage their security infrastructure more effectively. Given the variety of devices – different vendors, versions and administration tools – it is difficult to enforce industry best practices throughout the organization. Managers need tools that define best practices and are able to identify non-conformance for the full range of security devices.

In SecureTrack, Tufin has gathered a long list of best practices derived from firewall vendors, industry experts and years of practical experience. The configurable Best Practices Audit report instantly checks compliance with practices such as log tracking (rules that are untracked or unlogged), permissive rules (that allow traffic from too many IP addresses), network object name patterns, firewall OS settings, and more.

Scalable, Distributed Deployment Architecture and Multi-Tenancy

At large organizations, firewalls and related security infrastructure are frequently distributed at multiple sites, even in different countries. Slow network connections can frustrate attempts to analyze data from a central location and maintain consistency throughout the organization. Similarly, at large datacenters, network devices are often distributed on multiple management servers to increase performance. Yet it is still important to manage the security posture centrally.

Tufin SecureTrack features a robust distributed architecture that uses T-Series appliances to collect data from each site. Suitable for wide area networks, the collectors forward data to a central database for administration. SecureTrack is designed to overcome connection downtime between components and ensure a continuous, centralized management environment.

If you need to maintain integrity between sites or business units, SecureTrack provides full segregation of data along with flexible, role-based administrator definitions that provide access control for each management domain. At the same time, it gives you the ability to leverage Policy Analysis Queries and reports that you have designed for multiple tenants.

For all mission critical data centers, Tufin offers high availability, database compression, high-performance appliances and disaster recovery.

Firewall Operations Management: The Automated Solution

As network security infrastructure grows more distributed and diverse, operations teams must have central management solutions to ensure network security and Continuous Compliance, while keeping costs under control. . Tufin SecureTrack enables you to monitor, track and report changes for all firewalls, routers and switches in the organization. It creates a complete audit trail with full personal accountability for every change, along with configurable audit reports that support a wide variety of standards and regulations. With in-depth analysis tools, it gives you the power to proactively assess risks, replace permissive rules, and optimize the performance of your firewalls. SecureTrack is an essential solution for any organization that cannot afford to compromise on security and efficiency.

According to an analysis performed by Frost & Sullivan, organizations can slash the time required to make configuration changes, and to perform security audits, by as much as 75% (see Security Lifecycle Management ROI). Tufin customers report that on average, SecureTrack cuts the cost of daily operations tasks in up to a half, so that they can focus on the strategic part of their jobs instead of on routine, manual work.

Page 10: GDS International - Next - Generation - Security - Summit - Europe - 2

Firewall Operations Management 10/10

SecureTrack features all of the tools that operations teams need to ensure network security every day:

Change tracking and analysis: Monitors firewall policy changes, reports them in real-

time and maintains a comprehensive, accurate audit trail for full accountability.

Security infrastructure optimization: Analysis and clean-up of complex rule bases and

objects to eliminate potential security breaches and improve performance.

Risk management: Assessment of Security Score and risk trends based on

conformance to compliance policies and industry-standard risk factors.

Network topology intelligence: Discovery of network topology and creation of a

dynamic map including firewalls, routers and network zones. Automatic identification of

relevant devices and zones in requests, queries and reports.

Rule documentation and recertification: Documentation of rules and automatic

identification of expired rules so that they can be removed and recertified as needed.

Auditing and regulatory compliance: Automated audit reports to demonstrate

compliance with corporate policy and regulatory standards including PCI DSS, NERC,

SOX, HIPAA, ISO 17799 and Basel II.

Multi-vendor visual monitoring: Intuitive, graphical views of policies, rule bases and

configuration changes for the largest variety of vendors and network devices. Support for

next-generation and network-layer firewalls and Cisco routers with ACL's.

Comprehensive security policy analysis: In-depth analysis of organizational security

policy implementation on a wide range of security devices.

Automatic firewall policy generation: Definition of a new firewall policy based on an

analysis of network traffic and elimination of permissive rules.

Firewall OS Monitoring: Monitoring of critical firewall operating system components and

server performance indicators to prevent service interruptions and enable effective

auditing.

Scalable and business-critical: Includes high availability, database compression,

robust appliances and disaster recovery.

Distributed, multi-tenant architecture: Distributed architecture supports unlimited

firewalls, rules and network objects in large or distributed datacenters. Support for

multiple tenants or domains provides security among customers or business units.

Learn more about SecureTrack at www.tufin.com.

© 2008, 2009, 2010, 2011, 2012 Tufin Software Technologies, Ltd. Tufin, SecureChange, SecureTrack, Automatic Policy Generator, and the Tufin logo are trademarks of Tufin Software Technologies Ltd. All other product names

mentioned herein are trademarks or registered trademarks of their respective owners.