Redundant or shadowed security rules can never match network traffic because a prior rule or a combination of earlier rules prevents traffic from ever hitting them. FireMon can help you eliminate duplicate or shadowed rules that adversely impact the performance of your devices and introduce unnecessary complexity into your network.
Unused rules have not matched any packet during a specified time and are typically caused by applications that have been decommissioned or relocated. Many unused rules that are active on your devices can significantly degrade their performance and can potentially introduce risk into your environment. FireMon can perform real-time analysis and provide an unlimited history for rule and object usage in a policy to help you easily identify unused rules to optimize your network devices for peak performance and reduce risk.
Overly permissive rules typically contain large network ranges or ANY’s in the rule statements. Primary causes for excessive access include ineffective change management, lack of business requirements definition and lack of a rule “aging” strategy. Through our Traffic Flow Analysis feature, we can show unique traffic patterns that exist in a rule and report on what data is flowing across a broadly defined address range. We can replace the broadly defined access with a more correct and narrowly defined rule that will greatly enhance your hybrid network security posture.
Analyzing and recertifying rules can be a time-intensive effort as you attempt to maintain compliance. Through automated, event-driven review and verification, FireMon can help you keep and recertify the rules that are still needed and those that need to be decommissioned. We also enhance your compliance audit efforts by keeping full documentation of every rule recertification and justification.
Your security controls can become outdated over time, potentially compromising compliance and increasing risk. FireMon can help you achieve significant performance improvements through rule consolidation and restructuring those that are top talkers. With a streamlined clean-up process, you can improve your security posture and achieve continuous compliance.