Session 2 - Network Infrastructure Protection Through Automation
Session 2 - Network Infrastructure Protection Through Automation
Through Automation
@DaveSignori
Senior Director, Product Management
Agenda
• Discovery and Automation
• Hardening Device Configurations
• Configuration Analysis
What Subnet/VLAN
Block
Any Platform
Public
On-Prem Public
End Host Vulnerability Management Integration
Infoblox and Rapid7
Authoritative
Network
Network Database
Discovery
Notifications of
Changes &
Malicious Events
Infoblox can help with device discovery, notifying Rapid7 when new device joins the
network, so that Rapid7 can then immediately scan that device.
Track connected
endhosts
Remediate rogue or
compromised endpoints
• Landscape is vast
“Corporate & IT compliance managers continue to struggle managing their compliance programs using manual methods & tools.”
Gartner, Market Guide for Corporate Compliance and Oversight Solutions, April 2016
Configuration Compliance Management
Embedded compliance
rules
Customizable best
practice templates
Manage multiple
policies
Proactive violation
detected
Multiple remediation
options
Subscription
Maps to network
inventory
Multi-vendor
Configuration Analysis
Configuration Analysis
~300 out of the box configuration checks
Unique pre-packaged
expertise
Identifies common
misconfigurations
Customizable alerting
Recommended
remediation options
Understand concept of
the network
Network Scorecard
views
Configuration Analysis
Default Passwords Being Used
Sample
Daylight Savings Time Compliance
Security
High Config Activity
related
Issues Config Collection Disabled
Config Running Not Saved
Corrupt IOS Image File
Device Recently Restarted
Downstream Hub or Switch
Rogue DHCP Server Detected
Vendor Defaults Found
Weak Community String
Wireless AP Broadcasting SSID
Case Study
ROI Analysis
Before and After Network Automation
Metric Before Automation With Automation Comment
Inventory
Number of devices 12000 13000
Number of new devices per year 500 500 New environment could cause spike
Time spent deploying a new device (minutes) 60 60 config and OS - auto-remediation takes care of the last 5 or 10% of config
Time spent managing device maintenance contracts (minutes) NA NA
Time spent decommissioning devices (minutes) NA NA
Time spent generating inventory reports (minutes) NA NA
Configuration Search 16 hours 30 min
Standard Change
Number of standard changes per device per year 8 to 10 8 to 10 Doesn't include routine changes (i.e. port description)
Time spent making a standard change per device (minutes)(1 device) 5 15
Time spent making a standard change per device (minutes)(multiple) 5 ~0 ROI only in mass changes (6 out of 10 are individual)
30 but you have to know what you
Number of minutes to detect a change are looking for real time or < 1 minute
Time spent generating change tracking reports (minutes) Only TACACS Future
Compliance
250 config items 3 times a week. 48
Number of compliance checks per device per year 10 config items 365 times a year config items in real time.
Time spent to check compliance per device (minutes) 30 ~0
Time spent correcting a compliance violation per device (minutes) 30 Auto-remediation (0) or < 1 minute
Time spent generating compliance reports (minutes) 4 to 6 hours 3 to 5 minutes
Configuration Management
Real time but once a week forced and
Number of configuration backup cycles per year 365 second to pick up failure.
Time spent backing up a device configuration 0 0
Security
Time spent applying a vendor security advisory example: quarter 4 hours
OS Provisioning
Number of times OS is provisioned per device per year 1 1
Time spent deploying an OS per device 60 15 to 20 (individual) Deploy en masse and schedule reboots
CUSTOMER SUCCESS STORY
Infrastructure
Protection
Outcome:
• Automated means for auditing, enforcing, and reporting on DISA compliance, CVEs, and
network equipment lifecycle events
• Automated means for pushing global changes
Thank You
@DaveSignori
[email protected]