Enhancing firewall management with automation tools - Help Net Security

In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security needs with network performance. Firewall rule histories are an important tool for network and security teams. Evaluating the current network architecture and security requirements and any key assets or sensitive data will help a team determine the most suitable firewall type and configuration. You already said the most important part – security needs, useability, and network performance must be balanced, and it’s not always easy to find that common ground. In short, security teams can use firewall rule histories to identify both one-off issues and recurring patterns beyond what is immediately visible. Automation is an excellent tool for security professionals, and many aspects of a modern firewall can be automated – from checking and granting (or denying) access, to deploying new connections. Organizations can also take this to another level by automating specific responses to requests and rule deviations, removing a mundane and time-consuming process from the plates of their security teams altogether, while ensuring that networks continue to perform at a high-level. By automating the review of these guardrails, busy security teams can rest easy that any deviations from the established rules will be identified – and that they will receive an immediate notification if there is an issue, so they can respond quickly. While it is a mistake to ‘set it and forget it,’ it can easily overburden security teams if firewall management does not incorporate as much automation as possible. By regularly auditing rule histories, teams can identify risky behaviors, such as changing security policy or rules to enable a request, or a failure to update or remove outdated rules. An organization’s firewall policy sets the framework for inbound and outbound traffic management, administrative rights and access, which threats should be blocked and how best to adhere to regulatory and organizational compliance standards. Be sure to focus on key variables such as what network access levels are necessary to support, the desired level of security, internal segmentation (e.g., DMZ), regulatory and compliance requirements, the complexity of the network topology, and common/potential threat types. Regularly revisiting and adjusting the organization’s firewall ruleset to adapt to evolving network demands – and threats – is essential. It’s easy to ignore a problem and hope it goes away, but when it comes to false positives, teams need to find the root cause of legitimate traffic being blocked. This knowledge helps teams become proactive, both in preventing vulnerabilities – and in improving the security, and therefore the performance of their networks. When selecting a firewall, the first step an organization must take is to take a deep dive into the existing network infrastructure. Teams should verify that all rules have been applied correctly and that authorized traffic is getting through the firewall as planned. Weaknesses in network segmentation, control or governance processes can be uncovered, giving teams what they need to understand and address a potential issue before it’s too late. Emphasizing these factors as a firewall is selected will help to ensure that the choice ultimately reflects the unique challenges and needs of the organization. When configuring a firewall to govern incoming and outgoing traffic, it is important to understand the elements and endpoints of the new firewall (and/or the old one, if only adjustments are being made). Many firewall management tools offer visibility into rule sets and traffic patterns.

This Cyber News was published on www.helpnetsecurity.com. Publication date: Wed, 02 Oct 2024 05:43:05 +0000


Cyber News related to Enhancing firewall management with automation tools - Help Net Security

CVE-2024-26633 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2024-26857 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2024-35893 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2024-47685 - In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th->res1) Use ...
4 weeks ago Tenable.com
What Is a Host-Based Firewall? Definition & When to Use - Organizations often use host-based firewalls when specific network applications or services require open communication channels that aren't allowed under default firewall settings. To install a host-based firewall across all endpoints, choose your ...
9 months ago Esecurityplanet.com
Enhancing firewall management with automation tools - Help Net Security - In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security needs with network performance. Firewall rule ...
1 month ago Helpnetsecurity.com
Easy Firewall Implementation & Configuration for Small and Medium Businesses - Here at Cisco, we've developed industry-leading firewalls designed specifically for the needs of SMBs. Our Secure Firewalls for small businesses help simplify security, with streamlined implementation at a price point that is affordable. Once you ...
10 months ago Feedpress.me
What Is a Firewall Policy? Ultimate Guide - A firewall policy is a set of rules and standards designed to control network traffic between an organization's internal network and the internet. There are key components to consider, main types of firewall policies and firewall configurations to be ...
10 months ago Esecurityplanet.com
CVE-2024-50083 - In the Linux kernel, the following vulnerability has been resolved: tcp: fix mptcp DSS corruption due to large pmtu xmit Syzkaller was able to trigger a DSS corruption: TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending ...
3 weeks ago Tenable.com
Top 12 Firewall Best Practices to Optimize Network Security - The consistent implementation of firewall best practices establish a strong defense against cyber attacks to secure sensitive data, protect the integrity and continuity of business activities, and ensure network security measures function optimally. ...
11 months ago Esecurityplanet.com
CVE-2024-26781 - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible deadlock in subflow diag Syzbot and Eric reported a lockdep splat in the subflow diag: WARNING: possible circular locking dependency detected ...
7 months ago Tenable.com
CVE-2023-52784 - In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today. ...
5 months ago Tenable.com
9 Best Next-Generation Firewall Solutions for 2023 - Next-generation firewalls are network security solutions that go beyond the traditional port/protocol inspection by incorporating application-level inspection, intrusion prevention, and external threat intelligence. As the third generation in ...
11 months ago Esecurityplanet.com
What Are Firewall Rules? Ultimate Guide - Firewall rules are preconfigured, logical computing controls that give a firewall instructions for permitting and blocking network traffic. Network admins must configure firewall rules that protect their data and applications from threat actors. ...
9 months ago Esecurityplanet.com
CVE-2024-50035 - In the Linux kernel, the following vulnerability has been resolved: ppp: fix ppp_async_encode() illegal access syzbot reported an issue in ppp_async_encode() [1] In this case, pppoe_sendmsg() is called with a zero size. Then ppp_async_encode() is ...
4 weeks ago Tenable.com
CVE-2022-48956 - In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid use-after-free in ip6_fragment() Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers. It seems to not be always true, at least for UDP stack. syzbot ...
4 weeks ago Tenable.com
How to Get Started With Security Automation: Consider the Top Use Cases Within Your Industry - As the cybersecurity industry has matured, so has the approach security teams take to making decisions about investing in security tools. Instead of focusing on the latest product or technology, security professionals are focused on use cases such as ...
10 months ago Securityweek.com
Week in review: PoC for Splunk Enterprise RCE flaw released, scope of Okta breach widens - Vulnerability disclosure: Legal risks and ethical considerations for researchersIn this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in ...
11 months ago Helpnetsecurity.com
CVE-2024-50033 - In the Linux kernel, the following vulnerability has been resolved: slip: make slhc_remember() more robust against malicious packets syzbot found that slhc_remember() was missing checks against malicious packets [1]. slhc_remember() only checked the ...
4 weeks ago Tenable.com
Top Ten FirewallasaService Companies - Firewall as a Service (FWaaS) is a way of providing firewall functionality in the cloud, rather than on the traditional network perimeter. This is beneficial for businesses that have migrated their data and applications to the cloud, as it allows ...
1 year ago Cybersecuritynews.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
9 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
9 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
9 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
9 months ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)