Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

One-third of security professionals grounded for LIFE due to messy firewall rules

by The Gurus
July 21, 2016
in Editor's News
Share on FacebookShare on Twitter

A survey of 300 IT security professionals carried out by security management vendor FireMon at last month’s Infosecurity Europe has concluded that 65% believe that they would be grounded in some capacity for the messy state of their firewall rules. Of those, over half, or one-third of the total surveyed, said that if their firewall rules were a teenager’s bedroom, Mum would be so angry, she would ground them for life; and just 35% were confident Mum wouldn’t be angry at all. 
“Firewall rule management is one of those necessary evils within security management in organisations – it can be time consuming and at times a bit like untangling the wires in your junk drawer,” said Michael Callahan, CMO, FireMon.  “FireMon’s goal, with our range of security management products, is to help administrators whose job it is to do the untangling to move firewall rule management from one of those laborious, painful tasks, to something quick and easy, giving them the capacity to tackle more involved security management tasks.” 
The same study also showed that 32% claimed that they had inherited over half of the rules they manage from a predecessor and a quarter of security professionals confessed to being afraid to turn off rules that had been put in place prior to them managing them.  To add to the complexity, 72% of security professionals surveyed use two or more firewall vendors within their IT environments. 
“IT environments, even in smaller organisations, are becoming incredibly complex due to multiple vendors, technology advances in equipment and not to mention stringent compliance requirements. In fact, in the latest FireMon State of the Firewall survey, 52% of the security practitioners agreed that complexity is their biggest firewall management challenge,” explained Callahan. “Organisations in general, especially IT teams, are expected to do more with less resources.  When this happens, good management and automation can close gaps in resources while helping streamline processes and simplify tasks such as firewall rule management.” 
If, like the majority of IT security professionals, you’re in danger of being grounded over your messy firewall rules, here are some tips from Tim Woods, VP of Customer Technology  at FireMon on how to start tidying up your firewall policy: 
Step 1: Remove technical mistakes – A primary example of a technical mistake that is classified as ineffective, incorrect and not needed is a hidden rule which includes redundant and shadowed rules that serve no legitimate business purpose.  
Step 2: Remove unused access – Unused access rules bloat a firewall policy causing confusion and mistakes.  To determine rule usage, you need to analyse and correlate the active policy against the network traffic pattern; doing this over a sustained period will show definitively which rules are used versus unused to help with clean up. 
Step 3: Review, refine and organize access – You need to determine whether rules are justified against a defined business requirement and analyse the need vs. risk acceptance for the rule.  Start with rules that employ the use of “ANY”, as these could potentially be the most risky. 
Step 4: Continual policy monitoring – Don’t forget that maintaining an effective, efficient and correct firewall policy is an ongoing process.  Make sure you have real-time change event monitoring and alerting and real-time audit reporting to know when a violation of your security policy has occurred. 
The above four steps can (and should) be automated as they are extremely difficult, if not impossible, to do accurately as a manual process.

FacebookTweetLinkedIn
ShareTweet
Previous Post

PlayStation exec Shuhei Yoshida’s Twitter account hacked by OurMine

Next Post

Real-Time Security Intelligence, the future of security

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information