Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

The More Things Change, the More Security Change Management Needs to Change

Change is the norm for most security teams, as evolving business requirements as well as new threats dictate new or modified policies and tools. But security change management is handled poorly by most organizations. In some cases, it is “just” inefficient and slow, further contributing to the security department’s reputation of interfering with the business. In other cases it is error-prone, exposing the organization to risks from changes that were executed incorrectly or even causing network outages that can damage the company’s revenue and reputation.

Change is the norm for most security teams, as evolving business requirements as well as new threats dictate new or modified policies and tools. But security change management is handled poorly by most organizations. In some cases, it is “just” inefficient and slow, further contributing to the security department’s reputation of interfering with the business. In other cases it is error-prone, exposing the organization to risks from changes that were executed incorrectly or even causing network outages that can damage the company’s revenue and reputation. You need to look no further than the recent GoDaddy outage – originally suspected as a result of a DDoS attack, but later attributed by GoDaddy’s CEO to “internal network events”.

Several key factors contribute to change management challenges including:

Firewalls

Complexity – today’s “security policy” is spread out across multiple technologies and vendors and often spans multiple geographies and teams. 

Lack of a formal change control process that clearly defines and enforces the necessary steps, including documenting the “who, what, when, why and how” of making a change, and more importantly, the discipline to enforce this process even during “emergency” changes (even if it is after the fact). Questions such as “did anyone change anything on the firewall yesterday because XYZ just stopped working” are asked way too often by organizations.

Silos that separate security and operations teams which can lead to out-of-band changes, where one team makes a change without the proper checks and balances. In a network security survey from earlier this year, 55% of those surveyed said that an out-of-band or out-of-process change resulted in a system outage.

The “If it ain’t broke, don’t fix it” approach. Just because your network hasn’t gone offline doesn’t mean network security changes are causing issues such as slowing down the network or opening up gaps for attackers to exploit.

If we focus on firewall changes (since firewalls by far introduce the largest number of changes), many organizations have a helpdesk ticketing system that is used to track the status through completion. However these solutions were never designed to provide the necessary insight into everything that goes into processing a firewall change.

So as more changes come down the pipe, what needs to change in the change management process? In no way is my list below exhaustive, but it gives you a few things to think about in bringing your change management process up to par with industry leading organizations:

Advertisement. Scroll to continue reading.

Documentation. One of most important tasks that is least liked is documenting firewall changes that were made, such as what rules were added or changed, by whom, when, etc. so that other administrators understand the purpose of each rule. Good documentation can simplify troubleshooting and reduce the risk of service outages.

Get Network Security and Operations teams on the Same Page. This is more of a C-level initiative, but one that is critical in the day-to-day effectiveness of the change management process. Security and operations teams both should have ownership of different aspects of this process and if they are aligned properly, both security and agility will win out.

Reconciliation. Let’s face it, every organization has its “cowboys” that may introduce out-of- band change. Make sure that every change request is processed as approved but just as important, make sure that every change can be mapped out to a proper request.

Automation. Manually discovering all of the devices and rules impacted by a potential change, as well as understanding any potential change in risk or compliance levels, is time-consuming, tedious and prone to mistakes. Automation can be used to ensure accuracy, reduce risk and significantly reduce the time to process changes, which enables the organization to be able to more quickly respond to changing business needs.

You have two choices – you can continue to slowly chug along with manual change management processes that drain your IT resources, most likely introduce risk and ultimately impede agility. Or you can improve the process and communication and better enable these improvements through automation that helps align the different stakeholders involved in the change process (i.e. network operations, network security, compliance, business owners, etc.) and helps the business run more smoothly.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet