Perimeter
6/10/2015
11:00 AM
Jody Brazil
Jody Brazil
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
Google+
RSS
E-Mail vvv
100%
0%

Firewalls Sustain Foundation of Sound Security

Simply put, organizations that cannot maintain rigid firewall enforcement are more likely to be compromised.

Enterprise security necessitates a hierarchy of technologies and processes, and history has proven the firewall as a foundational element of that matrix.

As networks evolve and expand far beyond traditional concepts of the corporate perimeter – driven by mobility, virtualization and the cloud – models of security management have also transformed rapidly.

This advancement has shifted the manner in which organizations seek to protect their critical systems and data. However, effective security management will always retain a multi-layered approach necessitating mechanisms that control and limit access. While this may not someday require dependence on network security devices, in today’s environment the firewall remains one of the critical building blocks of network security.

Counterpoint: Why the Firewall is Increasingly Irrelevant, by Asaf Cidon, Co-Founder & CEO, Sookasa.

Strong encryption is another key capability that has matured over the decades, serving as a venerable fundamental. Yet, when a password is all that separates a user from access to the data, a significant security risk remains. Encryption is crucial, but additional security controls are necessary to prevent exploitation of a single string from resulting in a data breach.

While paradigms including mobility, virtualization and the cloud have created a new set of challenges (along with opportunities) to invoke additional security controls, the resulting distribution and hyper-segmentation of networks has in fact only made effective firewall management more important than ever before.

To Control Security, You Must Control Access
Despite the evolving perimeter, there are two primary reasons why maintaining effective network access and segmentation remains critical:

Reason 1: Hyper-segmentation only complicates enforcement. Further adoption of BYOD, virtualization and the cloud is resulting in “hyper-segmentation” of networks, making security controls exponentially more complex. As a result, network security infrastructure must mature to accommodate pervasive enforcement, placing greater emphasis on the firewall. Data is everywhere, but an attacker will perpetrate the most damage when the data is centralized and critical applications must be effectively protected, not just data at rest or in transit. Data Centers – even when run in the cloud – present such a target, and limiting access to these systems and potential vulnerabilities is a critical strength of the firewall.

Reason 2: Improper firewall management is a breachable offense. Many rightly point out that achieving compliance hardly constitutes attaining optimal security, but many compliance controls are industry standards with good reason. In its 2015 PCI Compliance Report, Verizon’s RISK team found that 73% of organizations that suffered a data breach were not in compliance with PCI DSS Requirement 1, related to firewall management. Stated plainly, organizations that cannot maintain rigid firewall enforcement are more likely to be compromised.

More than anything, firewalls limit the risk to an organization by allowing only necessary access. While that may still result in a certain amount of risk, it dramatically reduces the attack surface and allows security teams to focus on a reduced set of challenges. Frewalls also help prevent exfiltration of data, inappropriate outbound access, the spread of malware, and attackers’ efforts to pivot among compromised systems. Each of these risks exposes new opportunities for attackers to gain access to privileged data, or keys/passwords that further expose that data.

The Firewall’s Increasing Importance
There are three inalienable truths that highlight the continued importance of effective firewall management:

Firewalls dependencies are expanding, not retreating. Existing network security device infrastructure continues to become more essential as organizations actively deepen their reliance on it, while advancing its overall complexity. In the FireMon State of the Firewall 2014 Report (registration required), based on a survey of 700-plus practitioners, over 95% of respondents indicated that firewalls remain as critical, or more critical, than ever to overall security management. Meanwhile, over 88% of respondents said that they have deployed next-generation firewall (NGFW) systems with the goal of leveraging those devices to integrate multiple security functions and align management of network access directly to applications and users.

Emerging networking paradigms require firewall integration. The State of the Firewall Report also found that network security infrastructure will play a significant role in supporting emerging networking paradigms, with 87% of respondents attesting that traditional or NGFW devices currently play a valuable role in securing virtualized environments and another 60% indicating that those mechanisms play a valuable role in securing cloud platforms. According to a recent survey of 150 security officials published by Enterprise Strategy Group, organizations are currently struggling with enforcement of security policies in public and private clouds, application of existing security policies to the cloud, and management of security controls that span both physical and cloud-based infrastructure.

The power of positive security models. Firewalls are one of the few security technologies with a positive whitelist security model – allowing only necessary network traffic while denying the rest –the best defense against evolving threats. Security systems including anti-malware, IDS and SIEM, among others, depend on a highly limited blacklist approach. While they provide an important layer of defense, they also suffer from the challenge of trying to keep up with the latest, yet-unseen attack patterns, a model which largely doesn’t work. Even signature-less detection technologies are still dependent on the ability to recognize known behaviors in some manner. The firewall avoids this pitfall and remains a critical layer because it does its job, limiting access to only necessary traffic.  

While enterprise security models continue to mature, proper network access enforcement remains as critical as ever. This has always, and will always be the case, especially within the context of BYOD, virtualization and the cloud. In today’s environment and for the foreseeable future, the reality is that traditional and next-generation firewall infrastructure retains a significant role in protecting critical systems and data.

 

As founder and CEO of FireMon, Jody Brazil is a seasoned entrepreneur with more than two decades of executive management experience and deep domain expertise in all aspects of networking, including network security design, network security assessment and security product ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SteveM654
50%
50%
SteveM654,
User Rank: Apprentice
6/24/2015 | 10:53:46 AM
Firewalls Need to be Frequently Tested
Jody makes a valid point in terms of the need for a firewall within any multi-layered security infrastructure but hackers have become very adept at circumventing network perimeter defences and are constantly changing their attack vectors using back door methods to access the network core. In this situation over stretched IT teams can be lulled into a false sense of security convincing themselves that because they have a firewall in place they don't need to regularly assess its effectiveness in preventing new vulnerability exploit traffic to pass through un-blocked. Firewalls and IDS/IPS devices should be routinely tested using captured exploit traffic files and new rules added to fill in any holes in the defensive shield.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.