{"id":68165,"date":"2018-03-16T10:00:01","date_gmt":"2018-03-16T17:00:01","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=68165"},"modified":"2019-01-29T13:11:34","modified_gmt":"2019-01-29T21:11:34","slug":"10-things-to-test-in-your-future-ngfw-dynamic-security-policies","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2018\/03\/10-things-to-test-in-your-future-ngfw-dynamic-security-policies\/","title":{"rendered":"10 Things To Test In Your Future NGFW: Dynamic Security Policies"},"content":{"rendered":"<p><em>This post is part of a\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/10-things-to-test\/\">blog series<\/a>\u00a0where we examine the 10 things to test in your future next-generation firewall. These 10 points will help ensure your next firewall matches the needs of your organization in its current and future states.\u00a0<\/em><strong>\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Provide Dynamic Security Policies for Your Dynamic Virtual Workloads<br \/>\n<\/span>When security policies for data center environments are first created and deployed to firewalls, it\u2019s assumed that the assigned IP address will remain the same throughout the life of the policy. These policies are static, blanketed and applied in a generic fashion. With data centers transitioning to virtualized environments, workloads are no longer fixed to a particular location or networking schema.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Why Should You Advocate and Test This Capability?<br \/>\n<\/span>To address security in the virtualized data center, your firewall security policies should be based on the attributes of the workloads rather than tied to static IP addresses, since the data center environment is highly dynamic. This can be done through Dynamic Address Groups on a next-generation firewall.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Move Beyond the Status Quo<\/span><br \/>\nTransient workloads are frequently spun up and down to optimize compute resources, repeatedly acquiring new IP addresses. This makes it cumbersome and difficult to manage access-control policies on the firewall when dealing with hundreds or thousands of address groups, each with its own address objects, constant additions, deletions or changes.<\/p>\n<p>Your firewall should support policies that automatically adapt to the dynamic nature of today\u2019s datacenter, which involves constantly adding, moving or removing workloads for optimal use of compute resources. Adaptive policies help enforce consistent security across your dynamic virtual machines and applications.<\/p>\n<p>Dynamic Address Groups decouple security policies from IP addresses and instead build granular security policies based on the attributes of your virtual workloads. Policies on the firewall use tags mapped to workload attributes. For example, the tag on the firewall may be App-Server, which can be mapped to attributes that identify the specified application server regardless of its IP address. The attributes will continue to place the workload in the desired security policy even if the workload gets relocated.<\/p>\n<p>This helps you build security policies that are bound to workloads, enhancing your security posture. Dynamic Address Groups lower operational overhead by reducing dependence between applications and security teams.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Recommended RFP Questions<\/span><\/p>\n<hr \/>\n<ul>\n<li><span style=\"font-size: 14pt;\">How does the NGFW create security policies based on VM attributes of workloads?<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Can the NGFW create security policies for dynamic workloads in both private and public clouds?<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Can the NGFW ensure consistent security policies for workloads even when their IP addresses or locations change in the data center?<\/span><\/li>\n<\/ul>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/next-generation-firewall\/test-your-firewall-overview.html\">Learn more about the 10 things \u00a0to test for in your future NGFW.<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The next installment of our 10 Things to Test in Your Future NGFW series details the importance of testing a firewall for dynamic security policies<\/p>\n","protected":false},"author":226,"featured_media":68180,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,6717],"tags":[5548,5624,145,111],"coauthors":[2416],"class_list":["post-68165","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-firewall","category-products-and-services","tag-10-things-to-test","tag-dynamic-security-policies","tag-next-generation-firewall","tag-ngfw"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/03\/600x200.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/68165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=68165"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/68165\/revisions"}],"predecessor-version":[{"id":70274,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/68165\/revisions\/70274"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/68180"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=68165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=68165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=68165"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=68165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}