Releasing the brakes on business agility

Implementing a lifecycle approach to network security policy management speeds up application deployment, while strengthening compliance.

Sometimes, it seems that IT security teams just can’t win. They are judged on how they enable digital transformation initiatives and innovation, and are tasked with introducing new technologies to improve productivity and enable faster responses to market changes.

But they’re also expected to safeguard the organisation’s critical applications and data in an increasingly complex threat landscape – which means they’re often seen as an obstacle to innovation and business agility.

This is particularly true when it comes to provisioning business application connectivity. When an enterprise rolls out a new application or migrates an application to the cloud, it can take weeks or even months to ensure that all the servers, devices and network segments can communicate with each other, and at the same time prevent access to hackers and unauthorised users.

>See also: Why ‘data hoarding’ increases cyber security risk

This is in part because the infrastructure of even a medium-sized enterprise can include hundreds of servers and network devices such as firewalls and routers – and the addition of virtualised and hybrid cloud architectures only serves to compound this complexity.

Then there is the never-ending cycle of application updates and changes. For every single change, network and security teams need to understand how it affects the information flows between the various firewalls and servers the application relies on, and change connectivity rules and security policies to ensure that only legitimate traffic is allowed, without creating security gaps or compliance violations.

What’s more, communication between business and technical stakeholders is often lacking. This isn’t too surprising: each group speaks its own language, with application teams talking about business-level requirements, while network and security teams need to understand traffic flows, IP addresses and protocols. Important information is siloed, with each group using its own tools for tracking business requirements, network topologies and security and compliance policies.

A brake on agility?

The result is that many enterprises take an ad-hoc approach to managing application connectivity: they move quickly to address the needs of high-profile applications or to resolve imminent threats, but have little time left over to maintain network maps, document security policies, or analyse the impact of rule changes on applications.

>See also: The year of the cloud: availability and agility

This haphazard approach contributes to delays in the release of applications, can cause outages and lost productivity, increases the risk of security breaches and acts as a brake on business agility.

However, it doesn’t have to be this way. IT security does not have to accept more business risk to satisfy the demand for speed.

By managing application connectivity and network security policies through a structured lifecycle methodology, security teams can capture of all the major activities that should be followed when managing change requests that affect application connectivity and security policies.

This in turn enables applications to be deployed quickly and securely. Let’s look at each of the 5 stages involved in implementing this lifecycle approach.

Discover and visualise

The first stage involves creating an accurate, real-time map of application connectivity and the network topology across the entire organisation, including on-premise, cloud and software-defined environments.

Without this information, IT staff are essentially working blind, and will inevitably make mistakes and encounter problems down the line. Security policy management solutions automate the connectivity discovery, mapping, and documentation processes for applications across the thousands of devices on networks – a task which is enormously time-consuming and labour-intensive if done manually.

>See also: More analytics – speed and agility through prediction

In addition, the mapping process can help business and technical groups develop a shared understanding of application connectivity requirements.

Plan and assess

Once the business has a clear picture of its connectivity and network infrastructure, it can start to plan changes more effectively: ensuring that proposed changes will provide the required connectivity, while minimising the risks of introducing vulnerabilities, causing application outages, or compliance violations.

Typically, it involves translating application connectivity requests into networking terminology, analysing the network topology to determine if the changes are really needed, conducting a proactive impact analysis of proposed rule changes (particularly valuable with unpredictable cloud-based applications), performing a risk and compliance assessment, and assessing inputs from vulnerabilities scanners and SIEM solutions.

Automating these activities as part of a structured lifecycle process keeps data up-to-date, saves time, and ensures that key steps are not omitted – helping to avoid configuration errors.

Migrate and deploy

Deploying connectivity and security rules can be a labor-intensive and error-prone process. Security policy management solutions automate the critical tasks required, including designing rule changes intelligently, automatically migrating rules using intuitive workflows, and pushing policies to firewalls and other security devices – with zero-touch if no problems or exceptions are detected.

>See also: The journey of data storage: what’s next?

Crucially, the solution can also validate that the intended changes have been implemented correctly. This last step is often neglected, creating the false impression that application connectivity has been provided, or that vulnerabilities have been removed, when in fact there are time bombs ticking in the network.

Maintain

Most firewalls accumulate thousands of rules which become outdated or obsolete over the years. Bloated rulesets not only add complexity to daily tasks such as change management, troubleshooting and auditing, they can also impact the performance of firewall appliances, resulting in decreased hardware lifespan and increased TCO.

Cleaning-up and optimising security policies on an ongoing basis can prevent these problems. This includes identifying and eliminating, or consolidating redundant and conflicting rules; tightening overly permissive rules; reordering rules; and re-certifying expired ones.

A clean, well-documented set of security rules helps to prevent business application outages, compliance violations, and security gaps, and reduces management time and effort.

Decommission

Every business application eventually reaches the end of its life: but when they are decommissioned, their security policies are often left in place, either by oversight or from fear that removing policies could negatively affect active business applications. These obsolete or redundant security policies increase the enterprise’s attack surface and add bloat to the firewall ruleset.

>See also: The future state of hybrid data environments brings traditional problems

The lifecycle approach reduces these risks. It provides a structured and automated process for identifying and safely removing redundant rules as soon as applications are decommissioned, while verifying that their removal will not impact active applications or create compliance violations.

Benefits of the lifecycle approach

The lifecycle approach enables organisations to structure their application connectivity management activities logically, which reduces risks by ensuring that the right activities are performed in the right order, consistently.

For example, failing to conduct an impact analysis of proposed firewall rule changes can lead to service outages when the new rules inadvertently block connections between components of an application. A lifecycle approach helps to ensure this does not happen.

>See also: The year of the cloud: flexible, agile and scalable 

By utilising repeatable and automated processes organisations can respond faster to changing business requirements while reducing errors. These structured, documented processes also make audit preparation and compliance work much easier.

Finally, it facilitates improved communication and collaboration across IT groups and senior management.

It helps bring together diverse application delivery, network, security, and compliance teams to ensure that infrastructure and security changes truly serve the evolving needs of the business – enhancing agility without introducing risks.

 

Sourced by Joanne Godfrey, director of communications at AlgoSec

 

The UK’s largest conference for tech leadershipTechLeaders Summit, returns on 14 September with 40+ top execs signed up to speak about the challenges and opportunities surrounding the most disruptive innovations facing the enterprise today. Secure your place at this prestigious summit by registering here

Avatar photo

Nick Ismail

Nick Ismail is a former editor for Information Age (from 2018 to 2022) before moving on to become Global Head of Brand Journalism at HCLTech. He has a particular interest in smart technologies, AI and...

Related Topics

Agility
Automation