Everything you ever wanted to know about security policy management, and much more.
We’ve spent a lot of time on this blog talking about the importance of understanding and managing the connectivity required by business applications – whether in a physical data center or in a private cloud. However, even with a solution that provides an application-centric view of the security policy (providing that crucial link between applications and the connectivity that is allowed/not allowed by your firewalls) and enables alignment between the different business and technical stakeholders , you still need to actually discover all of the connectivity requirements. While this may be a one-time tactic, it is not trivial. In this latest firewall management 201 class with Professor Wool, he explains how firewall rules can be used to collect these application connectivity needs and he provides tips for going through this process.
Enjoy!
Receive notifications of new posts by email.