NSE1 Management and Analytics
NSE1 Management and Analytics
NSE1 Management and Analytics
Fortinet®, FortiGate®, and FortiGuard® are registered trademarks of Fortinet, Inc. in the U.S. and other
jurisdictions, and other Fortinet names herein may also be trademarks, registered or otherwise, of
Fortinet. All other product or company names may be trademarks of their respective owners. Copyright
© 2002 - 2016 Fortinet, Inc. All rights reserved. Contents and terms are subject to change by Fortinet
without prior notice. No part of this publication may be reproduced in any form or by any means or
used to make any derivative such as translation, transformation, or adaptation without permission from
Fortinet, Inc., as stipulated by the United States Copyright Act of 1976.
Table of Contents
Analytics ..................................................................................................................................9
Security Information and Event Management...............................................................................................9
Network Visibility ..........................................................................................................................................10
Summary .................................................................................................................................11
REFERENCES ...............................................................................................13
Management and Analytics Security Management
Security Management
Simply stated, security management exists at the region where the
scope of IT security and IT operations meet.
As organizational structures grow in size and complexity, the
tendency is for more network resources—machines, servers, routers,
etc.—to be deployed. As the network grows, so also does the scope
of potential threats to the secure and efficient operation of the network to meet organizational goals. With
the global nature of modern business and e-commerce, the sheer number of branch and remote
locations—and managed devices—make a consolidated network security management essential for
effective IT administration. To this end, the primary goal of security management is to reduce security
risks by ensuring that systems are properly configured—or hardened—to meet internal, regulatory, and/or
compliance standards. Security management is a software-based solution that integrates three primary
elements:
Vulnerability Assessment. Network security analysis designed to identify critical IT security weaknesses
that a cyber-attacker could exploit.
Automated Remediation. Allows automated correction of faults or deficiencies—vulnerabilities—
identified in the assessment process. Provides reports and tools to track vulnerabilities that must be
remediated manually.
Configuration Management. Evaluates the security of a network’s critical servers, operating systems,
application-level security issues, administrative and technical controls, and identifies potential and actual
weaknesses, with recommended countermeasures.
IT managers are faced with challenges that range from simple codes to threats hidden in secure packets
designed to target cloud-based applications. Modern and emerging future threats present dynamic and
potentially complex challenges to network security demanding comprehensive, complex security
solutions. Unfortunately, studies have shown that the more complex administrative functions become,
the less likely that network administrators will spend the requisite amount of attention to the various
apparatus and displays. For this reason, consolidating security management into a single console
enabling monitoring and management of network security was developed. Through this integrated
monitoring and control solution, IT managers may address the following issues:
Device Configuration. Manages the configuration of each device on the network and maintains the
system-level configuration required to manage the network environment. This includes monitoring
device firmware to ensure it is kept up to date.
Firewall Policy. Provides viewing and modification of firewall configurations—access rules and
inspection rules—in the context of the interfaces whose traffic is filtered.
Content Security Policy. Computer security technique to prevent cross-site scripting (XSS) and related
application-level attacks. It provides a standard HTTP header allowing website administrators to
determine approved sources of content that browsers may load on designated pages. Covered types
include JavaScript, CSS, HTML frames, fonts, images, and embeddable objects like Java applets,
ActiveX, audio, and video files.
A conceptual diagram of security management is illustrated in Figure 1 below:
SM SM SM
Analyst Console Database
SM – Monitored Devices
large and distributed enterprise networks, security management must be able to be customized to meet
the needs of each level of operation. For example, the Application Program Interface (API) specifies how
software components should interact and are used when programming the graphical user interface (GUI),
allowing visibility of the customized network functions. Automation is important especially for large and
distributed enterprise networks, providing an automated workflow enabling users to approve, deny, defer,
or even execute remediation of configuration errors, potentially saving considerable time and effort.
Firewall rules (also called firewall policies) are a major challenge for network security administrators,
making it important for companies and organizations—especially those with distributed enterprise
operations—to have and implement a firewall policy management solution. Depending on the size of the
operation and network, this function may be accomplished by the network security administrator or, in a
large enough enterprise, a firewall administrator. With the fast-paced and rapidly evolving dynamics of
technology and its use, the threat of security gaps being created because of a disjointed firewall policy
program is as real as the threat from external sources.
To assist the network security administrator or firewall administrator in developing, implementing, and
monitoring firewall policy requirements and effectiveness, regular and systematic reviews of firewall
policies should be put in place. These reviews provide important benefits, mitigating challenges such as:
Mistakenly adding duplicate, similar, or overriding firewall policies
Missing the impact of corporate policy changes that may impact particular rules
Creation of policies that are too specific at the time of implementation and may need to be
broadened to be effective
Determining what/when policies should be implemented by a policy push—that is, applying the
new policies to individual security devices
In order to facilitate inputs to the firewall policy development and review process, a firewall policy
workflow process should be established by which policy change recommendations are submitted,
approved, and implemented by IT staff, and then the document retained for archival purposes for later
analytic review. As these processes become institutionalized, the end result becomes not only more
effective firewall rules management, but efficiency that leads to rules reduction, or a decrease in firewall
rules via periodic reviews or automation.
Security Change Management is the industry term for the product or feature that seeks to reduce or
optimize the number of firewall rules. It provides IT staff and network auditors with a clear picture of how
changes were implemented. With more complex firewalls incorporating more features—such as the Next
Generation Firewall (NGFW)—simplification of the user interfaces that represent complex security
processes increases the likelihood that comprehensive security measures will be engaged, monitored,
and updated as necessary to keep up with emerging threats. This process will also minimize the number
of times that temporary firewall rule changes – used to test new options, software, or hardware – are
forgotten and left to clutter up the configuration.
Auditing has important advantages in the security management environment. Because auditing is a
mechanism that records actions that occur on a system, the associated audit log(s) contain information
detailing the events (such as login, logout, file access, upload, download, etc.), who performed the action,
when it was attempted, and whether the action was successful. Some important events that should be
logged include:
Analytics
Analytic reporting is designed to provide end-to-end analysis of system and network performance. In the
context of security management, this analysis includes factors concerning potential impacts on
performance due to attempted or successful attacks, actions taken by preventative policies and apparatus
that detected and prevented intrusion, forensic records of user data for system and network functions,
and so forth.
Of course, without applying analytics to future decisions, they cease to serve a vital function to
administrators. The most important function of analytics is to ensure security effectiveness and
improvement while enabling optimum system and network performance.
Reporting is designed to be a cyclical process—not linear; that is, the data analyzed is used to inform
decisions regarding whether policies, programming, or apparatus need to be updated or may remain as
currently constituted. If updates are necessary, analytics inform decision-makers—such as corporate
compliance groups—in determining what updates or reconfigurations are the right ones to accomplish.
1) Debugging 5) Error
2) Information 6) Critical
3) Notification 7) Alert
4) Warning 8) Emergency
attempted network intrusions. This capability, although it becomes more complex as networks grow and
become geographically distributed, is important to networks of all sizes against modern and future
network threats.
In the 1980s, Syslog was developed as part of the Sendmail project, but proved so valuable a tool that it
began being used by other applications as well. In today’s IT world, Syslog is still the de facto industry
standard for security event logging. In fact, Syslog has become entrenched as the standard, such that
operating systems such as Windows and UNIX, as well as regulations such as SOX, PCI DSS, and
HIPAA either use Syslog format or have embedded capability for conversion to Syslog.[2]
Because it is a necessity for networks of every size, the factor of resource balancing is an important
consideration. As with determining whether application services as IaaS, PaaS, or SaaS are best suited,
the most cost-effective logging/reporting method for SMB is typically cloud-based event logging. Similarly,
some organizations may opt for standalone logging/reporting solutions to more effectively manage logs
collected from multiple security devices.
Network Visibility
Network Visibility refers to the ability for administrators to know what type of traffic is crossing their
network, including Web, applications, email, etc. It allows optimization of bandwidth for business critical
applications. Because modern and emerging threats are able to take advantage of different traffic types in
different ways, network visibility is a key capability in the administrator’s arsenal, providing the opportunity
to achieve:
Network monitoring and faster troubleshooting
Application monitoring and profiling
Capacity planning and network trends
Detection of unauthorized WAN traffic
firewalls, email gateways, endpoint devices, and other network components, both physical and virtual.
As with analytics reporting, network visibility must be treated as a cyclical process in order to be effective.
As illustrated in Figure 5, network visibility provides a wealth of information about many facets of network
operations. All of this data, however, is lost if not used to inform analyses that may improve further
network operations and security. For this reason, network visibility data should be used to inform
reporting on network operations and be used in developing future plans and policy.
Summary
Security management provides vulnerability assessment, automated remediation, and configuration
assessment in and environment providing complex protection with simplified administration. The goal of
security management is to reduce security risks through proper configuration and compliance.
Across all sizes and types of networks, security management provides customization and automation to
assist network security administrators through administrative domains to segment users, firewall & global
policy packages enabling reduction and optimization of rules, and auditing that provides oversight of
compliance, workflow, approvals, and forensic tracing.
Security Information and Event Management (SIEM) provides a wide range of administrator services in
managing logged events and analysis to correlate and determine the most appropriate security
measures, policy updates, and reactions to network incidents.
Network visibility provides administrators with the necessary end-to-end monitoring, troubleshooting,
profiling, and analysis tools to plan and address modern and emerging threats to the network. Adept
management, using the right analytics to inform decisions and actions, are key to establishing and
maintaining an efficient and secure network environment.
Key Acronyms
ADOM Administrative Domain SaaS Software as a Service
API Application Programming Interface SDN Software-Defined Network
APT Advanced Persistent Threat SEG Secure Email Gateway
ATP Advanced Threat Protection SIEM Security Information and Event
AV/AM Antivirus/Antimalware Management
FTP File Transfer Protocol SLA Service Level Agreement
FW Firewall SM Security Management
GUI Graphical User Interface SMB Small & Medium Business
HTML Hypertext Markup Language SNMP Simple Network Management Protocol
HTTP Hypertext Transfer Protocol SSL Secure Socket Layer
HTTPS Hypertext Transfer Protocol Secure SYN Synchronization packet in TCP
IaaS Infrastructure as a Service Syslog Standard acronym for Computer
IDS Intrusion Detection System Message Logging
IP Internet Protocol TCP Transmission Control Protocol
IPS Intrusion Prevention System TCP/IP Transmission Control Protocol/Internet
IT Information Technology Protocol (Basic Internet Protocol)
J2EE Java Platform Enterprise Edition TLS Transport Layer Security
LAN Local Area Network TLS/SSL Transport Layer Security/Secure
Socket
MSP Managed Service Provider
Layer Authentication
MSSP Managed Security Service Provider
UDP User Datagram Protocol
NGFW Next Generation Firewall
UTM Unified Threat Management
NSS NSS Labs
VDOM Virtual Domain
PaaS Platform as a Service
VM Virtual Machine
PC Personal Computer
WAN Wide Area Network
PCI DSS Payment Card Industry Data Security
XSS Cross-site Scripting
Standard
PHP PHP Hypertext Protocol
References
1. Tam, K., et al., UTM Security with Fortinet: Mastering FortiOS. 2013, Waltham, MA: Elsevier.