Tech,Space,Gaming, and Science Fiction News to wet your whistle
Make It So: Accelerating the Enterprise with Intent-Based Network Security
Sometimes, it seems that IT and security teams can't win. They are judged on how quickly they can deploy their organization's latest application or digital transformation initiative, but they're also expected to safeguard those critical applications and data in increasingly complex hybrid networks – and in an ever more sophisticated threat landscape. That's not an easy balancing act.
When an enterprise rolls out a new application, or migrates a service to the cloud, it can take days, or even weeks, to ensure that all the servers and network segments can communicate with each other, while blocking access to hackers and unauthorized users. This is because the network fabric can include hundreds of servers and devices (such as firewalls and routers) as well as virtualized devices in public or private clouds.
When making changes to all these devices, teams need to ensure that they don't disrupt the connectivity that supports the application, and don't create any security gaps or compliance violations. But given the sheer complexity of today's networks, it's not too surprising that many organizations struggle with doing this. Our 2019 survey of managing security in hybrid and multi-cloud environments found that over 42% of organizations had experienced application or network outages caused by simple human errors or misconfigurations.
What's more, most organizations already have large network security policies in place with thousands, or even millions of policy rules deployed on their firewalls and routers. Removing any of these rules is often a very worrisome task, because the IT teams don't have an answer to the big question of "why does this rule exist?"
The same question arises in many other scenarios, such as planning a maintenance window or handling an outage ("which applications are impacted when this device is powered off?", "who should be notified"?), dealing with an insecure rule flagged by an audit, or limiting the blast radius of a malware attack ("What will be impacted if we remove this rule"?).
Intent-based networking (IBN) promises to solve these problems. Once security policies are properly annotated with the intent behind them, these operational tasks become much clearer and can be handled efficiently and with minimal damage. Instead of "move fast and break things" (which is unattractive in a security context, because "breaking" might mean "become vulnerable") – wouldn't it be better to "move fast and NOT break things"?
Intentions versus reality
As such, it's no surprise that IBN is appealing to larger enterprises: it has the potential to ensure that networks can quickly adapt to the changing needs of the business, boosting agility without creating additional risk. However, while there are several IBN options available today, the technology is not yet fully mature. Some solutions offer IBN capabilities only in single-vendor network environments, while others have limited automation features.
This means many current solutions are of limited use in the majority of enterprises which have hybrid network environments. To satisfy security and compliance demands, an enterprise's network management and automation processes must cover its entire heterogeneous fabric, including all security devices and policies (whether in the data center, at its perimeter, across on-premise networks or in the cloud) to enable true agility without compromising protection.
So how can enterprises with these complex, hybrid environments align their network and security management processes closely to the needs of the business? Can they automate the management of business-driven application and network changes with straightforward, high level 'make it so' commands?
Also, where would the "intent" information come from? In an existing "brown-field" environment, how can we find out, in retrospect, what was the intent behind the existing policies?
The answer is that it is possible to do all this with network security policy management (NSPM) solutions. These can already deliver on IBN's promise of enabling automated, error-free handling of business-driven changes, and faster application delivery across heterogenous environments – without compromising the organizations' security or compliance postures.
Intent-based network security
The right solution starts with the ability to automatically discover and map all the business applications in an enterprise, by monitoring and analyzing the network connectivity flows that support them. Through clustering analysis of netflow traffic summaries, modern NSPM solutions can automatically identify correlated business applications, and label the security policies supporting them – thereby automatically identifying the intent.
NSPM solutions can also identify the security devices and policies that support those connectivity flows across heterogeneous on-premise, SDN and cloud environments. This gives a 'single source of truth' for the entire network, storing and correlating all the application's attributes in a single pane of glass, including configurations, IP addresses and policies.
With this holistic application and network map, the solution enables business application owners to request changes to network connectivity for their business applications without having to understand anything about the underlying network and security devices that the connectivity flows pass through.
The application owner simply makes a network connectivity request in their own high-level language, and the solution automatically understands and defines the technical changes required directly on the relevant network security devices.
As part of this process the solution assesses the change requests for risk and compliance with the organization's own policies, as well as industry regulations. If the changes carry no significant security risk, the solution automatically implements them directly on the relevant devices, and then verifies the process has been completed – all with zero touch.
This means normal change requests are processed automatically — from request to implementation — in minutes, with little or no involvement of the networking team. Manual intervention is only required if a problem arises during the process, or if a request is flagged by the solution as high risk, while enabling IT, security and application teams to continuously monitor the state of the network and the business applications it supports.
Network security management solutions realize the potential of IBN, as they:
Offer an application discovery capability that automatically assigns the intent to existing policies
Translate and validate high-level business application requests into the relevant network configuration changes.
Automate the implementation of those changes across existing heterogenous network infrastructure, with the assurance that changes are processed compliantly.
Maintain awareness of the state of the enterprise network to ensure uptime, security and compliance.
Automatically alert IT staff to changes in network and application behaviors, such as an outage or break in connectivity, and recommend corrective action to maintain security and compliance.
These intent-based network security capabilities allow business application owners to express their high-level business needs, and automatically receive a continuously maintained, secure and continuously compliant end-to-end connectivity path for their applications. They also enable IT teams to provision, configure and manage networks far easier, faster and more securely. This achieves the delicate balance of meeting business demands for speed and agility, while ensuring that risks are minimized.
About the author: Professor Avishai Wool is the CTO and Co-Founder of AlgoSec.
By Liam McCabe This post was done in partnership with Wirecutter . When readers choose to buy Wirecutter's independently chosen editorial picks, it may earn affiliate commissions that support its work. Read the full article here . After six summers of researching, testing, and recommending window air conditioners, we've learned that quiet and affordable ACs make most people the happiest—and we think the LG LW8016ER will fit the bill in most rooms. This 8,000 Btu unit cools as efficiently and effectively as any model with an equal Btu rating, and runs at a lower volume and deeper pitch than others at this price. Little extra features like a fresh-air vent, two-axis fan blades, and a removable drain plug help set it apart, too. The LG LW8016ER is a top choice for an office or den, and some people will find it quiet enough for a bedroom, too. If our main pic
Science It’s science—on ice. Ice is an important part of the Winter Olympics. To get these slick surfaces just right, athletes rely on experienced ice technicians. via Popular Science "http://ift.tt/2H39W6C"
Last week, the Overwatch team released a new map: Blizzard World. The multiplayer arena is a colorful amusement park filled with attractions and rides themed after Blizzard's stable of games. It's a delightful backdrop for the team-based shooter, filled with in-jokes and puns that make it look like a rapturous place for a gamer to visit. But what would it take to bring Blizzard World to life? Theme parks are a wildly expensive business, but that hasn't stopped the biggest ones from building brand-new areas based on blockbuster entertainment franchises. The highly anticipated Star Wars zones set to open at Disneyland California and Disneyworld Orlando in 2019 are examples, and there are the Harry Potter Worlds in Japan, Hollywood and Florida. The Blizzard World stage is the studio's own interpretation of an entertainment theme park, bustling with rides, shops and restaurants inspired by Blizzard games. In fact, players can only run around a portion of it, as a