* Network map - to see how firewalls and routers are connected.
* Traffic simulation - to emulate traffic through the rule-base and see if you need to open additional ports/services.
* FireFlow - to order new firewall openings.
Good and bad experience - A case study of the use of AlgoSec FireFlow.
The Good:
· Cut turnaround time on firewall rule changes from weeks to days.
· Improved network visibility via policy discovery, map and traffic simulations.
· Increased accuracy of firewall changes with improved network security.
· Highly improved traceability and accountability in the firewall change process.
· It is easy to customise AlgoSec FireFlow to a quality system.
The Bad:
· Lots of time was used to build and maintain the topology database (the network map). This is the foundation for the magic to happen. If the topology is wrong, the path discovery and automatic selection of Firewalls in path / in scope for the change can be incorrect.
· A decommissioning feature is missing in FireFlow, separate unused rules can be found and decommissioned via the AlgoSec Analyzer, but the FireFlow product does not have a feature for decommissioning of a complete FireFlow ticket.
· The system has a so called roll-back feature, but this is implemented very simply just by a restore of the complete configuration. In practice, this feature is not useful. If a FireFlow ticket is implemented, and it is discovered that some of the data in the ticket was wrong, it is not possible to roll-back the mistakenly implemented firewall rules. The cleanup is a manual task that can be time consuming.
Challenges in this case story:
To reach the goal and have the above highlighted business impact, several challenges were faced during the first year of deployment.
One of the best lessons is that the AlgoSec FireFlow system is only accurate if the network topology is complete and accurate. We would have to spend a lot of time tweaking the network topology to make it accurate.
Another challenge was software bugs. AlgoSec technical assistance center was keen to help fix the software defects, but still it was time consuming at times when software defects were disturbing normal operation.
Results
Firewalls need constantly maintained rule changes and security assessment in order to adapt to the ever changing business and threats. We see our decommissioned business applications, new factories or sites that are build, etc.
This altogether brings a heavy workload on the security department.
Now the firewall maintenance tasks scale with existing staff.
Firewall rule changes take days and not weeks.
The most significant benefits we achieved were:
· All firewall rules match exactly the planned action
· All stages of a change are now accountable in the history/audit trail of the change
· No time spent on already working change requests
· Full visibility into the network path of traffic
The intelligence provided by the AlgoSec system, and easy accessible security controls are significant, reducing the time spent in the periodic security assessments carried out.
in the AlgoSec product:
Over the last couple of years we have had several missing features in the product that prevented us from reaching the full extent of automation from a start. However, most of the missing capabilities are today in the product.
Remaining is a better support for decommissioning of firewall rules and applications. This is high on our wish list.
Challenge
As responsible for the network infrastructure and security on more than 95 firewalls. The network infrastructure and security must follow the same strict regulated quality guidelines as the main business area itself.
The most central aspects of strict regulated quality are:
Traceability: the ability to reconstruct the development history of the products.
Accountability: the ability to resolve who has contributed what to the development and when.
Firewall change management in this environment is time consuming and cumbersome.
Each firewall change took several weeks with high cost. Many firewall rules were build unnecessarily wide due to complexity in network.
Many changes were performed for already working traffic. Human errors in creation of firewall rules put the total security at risk. The validation process was cumbersome and error prone.
Solution
We succeeded in automating the flow in the change process with full traceability and accountability. AlgoSec FireFlow was integrated with the surrounding quality system using the great customisation capabilities, and is now used as the main change management system for all infrastructure changes to Switch, Router and Firewalls in the production network.
We took advantage of the AlgoSec system's ability to add intelligence in all stages of a change.
This raised the accuracy of firewall changes.
* Network map - to see how firewalls and routers are connected.
* Traffic simulation - to emulate traffic through the rule-base and see if you need to open additional ports/services.
* FireFlow - to order new firewall openings.
* Less overhead on the network security department since the user can verify the rules themselves.
* Risk profiles helps find disallowed traffic.
* Policy cleanup feature is really good for removing unused rules, etc.
* More unified UI
Since 2013
We were immediately able to leverage the workflow tools in FireFlow with ActiveChange to speed up our deployment of firewall policies.
By leveraging BusinessFlow/FireFlow/ActiveChange we have been able to reduce the time from initial requirements gathering to implementation of complex firewall designs by approximately 80% without compromising our security posture.
Additional understanding of complex routing in multiple systems.
We have had this working in our production environment for about 6 months.
The initial deployment was unsuccessful as the product had not initially support our use of virtual routing instances on Juniper SRX devices however AlgoSec engineering was quick to deploy fixes to allow us to reach our desired outcome.
None.
None.
Top notch.
The most valuable features are the risky rules analysis and network diagram representation generated from the firewall perspective.
It has helped to detect all unauthorized changes made on my firewalls. Also, this product can identify if anyone is creating dangerous rules that can severely affect the security of my organization.
One scope of improvement is to create an architecture diagram that combines intelligence from all integrated firewalls.
I have used this product for three years.
During the early implementation phase, some stability issues were experienced. However, that is somewhat stable now.
We have not encountered any scalability issues yet.
I manage the reviews aspect, not maintenance.
We were not part of the implementation team.
We evaluated the FireMon solution prior to this product.
Prior planning is required for licensing and appliance handling if the company is looking to introduce new firewalls/security devices. This tool even integrates Cisco products to track changes on core switch or primary routers/VPNs.
AlgoSec assists with identifying traffic flow and related issues within a short span of time. The operational value it provides us helps in increasing our efforts towards different issues, thus increasing our scope of work.
We haven't observed any technical issues with AlgoSec and the support provided is as per the expectations. Overall, we are satisfied with AlgoSec products and services.
I would like to see an improvement to the technical support which is provided by AlgoSec.
We recommend the AlgoSec Firewall Security Management solution to our customers in order to help them with firewall policy application and optimization.
This solution helps all of our customers. They are network engineers and network administrators who need to recertify expired firewall rules, as well as clean and remove all of the rules that the customer doesn't need in their devices.
The most valuable feature is the ability to deploy new rules in all of the firewalls included in the environment at one time. This automates the process instead of installing one rule or one device at a time.
The UX control panel is in need of improvement.
I have used AlgoSec for a long time and with many customers.
Firewall analyzer and traffic simulation based on configuration analyzer of all rules on the firewall. Implementation of new rules without the need for manual configuration of rules on all firewalls in the traffic path.
It helped to improve our automation and simplified the configuration of new access rules.
In our experience, AlgoSec need to improve the integration of firewall vendors, because at the moment they don't support all vendors that are out there.
Algosec Firewall Analyzer has a feature called 'Implement on device' which automatically creates access rules based on your request and sends it to the appropriate device. At the moment, this feature can not be implemented on Fortigate firewalls or Juniper EX switches which act as a layer three device with ACL's etc. I mean they need to improve interoperability with more vendors in order to automate access rules modification on these unsupported yet equipment.
I've used this solution for approximately five months.
According to my colleagues who implemented it, there were some problems during the implementation. They contacted their support team who provided us with good support and we were able to get it implemented.
We had no issues with the performance.
It's been able to scale for our needs.
I wasn't involved in the original implementation.
It's an amazing product for those admins who have huge variety of firewall vendors and would like to be able to automate the implementation of new firewall rules for access across the network.
I've used it for two years.
I wasn't involved in the deployment; I just use it as a firewall engineer.
Sometimes due to server database size, the disk gets exhausted and then there is slowness over the internet.
I haven't been involved with contacting AlgoSec.
Technical Support:I haven't been involved with contacting AlgoSec.
I haven't used any other solution.
I was not the one who made the decision, but I have been supporting for customer.