GENERALIZED NETWORK SECURITY POLICY TEMPLATES FOR IMPLEMENTING SIMILAR NETWORK SECURITY POLICIES ACROSS MULTIPLE NETWORKS
The present invention is directed to a facility for adapting a network security policy model for use in a particular network. The facility retrieves the network security policy model, which comprises network security rules each specified with respect to one or more aliases. Each alias represents a role in a network for one or more network elements. The facility receives, for each alias included in the network security policy model, a list of one or more network elements in the network serving the role represented by the alias. The facility replaces each alias in the network security policy model with the received list of network security devices specified for the alias to produce a network security policy adapted for use in a network.
The present invention is directed to the field of automated network security.
BACKGROUND OF THE INVENTIONNetwork security devices provide various types of network security services to a network, such as a local area network connected to the Internet. For example, a network security device may perform access control and traffic monitoring and logging. Access control refers to the regulation of network traffic based upon its type, content, source, and/or destination. For example, access control services of a network security device can be employed to prevent email traffic from sources on the Internet from reaching computer systems inside the network other than a designated mail host computer system. Traffic monitoring and logging refers to observing network traffic, and storing important observations about the network traffic in a log. As an example, traffic monitoring and logging services of a network security device can be employed to log all unsuccessful attempts from sources on the Internet to access a server in the network containing sensitive information.
Unfortunately, in order to perform such functions, conventional network security devices generally must be configured manually, typically on-site at the location of the network. Such configuration can be extremely time-consuming. Also, because of the nature of typical configuration processes, they generally must be performed by a technical specialist whose time is both scarce and expensive. It is especially important that the configuration process be performed correctly, since misconfiguration of a security device often leaves the network that is to be protected by the security device vulnerable to attack or other abuse.
These shortcomings of conventional network security device configuration processes tend to make the installation and use of a network security device difficult and/or expensive. Accordingly, a streamlined, more highly automated configuration process that is capable of correctly configuring network security devices would make the proper use of such network security devices more accessible, and would therefore have significant utility.
SUMMARY OF THE INVENTIONThe present invention provides a software facility for implementing similar network security policies across multiple networks (“the facility”). Each network is a collection of network elements, including a network security device that protects the network by implementing a network security policy (hereinafter simply “policy”) within the network. While Firebox II network security devices provided by WatchGuard Technologies, Inc., of Seattle, Wash. are suggested for use with the facility, the facility preferably also operates with other network security devices available from other sources.
The policy implemented in a particular network comprises a set of rules for managing network traffic. These rules are specified in terms of specific network elements, such as user workstations, servers, routers, and printers, that perform certain functions, or “roles.” For example, a rule in a network security policy for a particular network may specify that all email traffic must flow through a network element having a particular network address that is specifically configured as a mail host. In a sense, these rules establish trust relationships between specific network elements, or groups thereof.
The facility preferably provides a user interface for constructing one or more network security policy templates (hereinafter simply “templates”) that can each be used to generate similar policies for any number of specific networks. A template contains rules expressed in terms of “aliases,” rather than in terms of specific network elements. For example, a template may include a rule specifying that all email traffic must flow through a “MailHost” alias that is not associated with a particular network address.
To generate a policy for a particular network from a template, the facility uses a profile of the network that maps the aliases occurring in the template to specific network elements within the network. For example, the network profile for a particular network maps the “MailHost” alias to a particular network element of the network having a particular network address. The facility preferably provides a user interface that makes it convenient for a user to generate network profiles.
The facility uses the profile for the network to replace occurrences of aliases in the template with the addresses of the corresponding specific network elements. The facility preferably sends the resulting network-specific policy to the network security device of the network for implementation. In certain embodiments, the policy may be further modified before transmission to the networks security device.
This process can be repeated to generate policies for each of a number of other networks. At a later time, the underlying template can be revised to add or change rules. Together with the network profiles, this revised template can be used to automatically generate revised policies corresponding to the revised template for all of the networks.
The facility is especially well suited for use by Internet service providers and other organizations responsible for providing network security to a large number of networks, as it enables these organizations to configure the network security devices for additional networks at a very low cost. The facility also enables such organizations to efficiently update the configuration of a large number of operating network security devices by merely modifying and reapplying one or more templates.
The present invention provides a software facility for implementing similar network security policies across multiple networks (“the facility”). Each network is a collection of network elements, including a network security device that protects the network by implementing a network security policy (hereinafter simply “policy”) within the network. While Firebox II network security devices provided by WatchGuard Technologies, Inc., of Seattle, Wash. are suggested for use with the facility, the facility preferably also operates with other network security devices available from other sources.
The policy implemented in a particular network comprises a set of rules for managing network traffic. These rules are specified in terms of specific network elements, such as user workstations, servers, routers, and printers, that perform certain functions, or “roles.” For example, a rule in a network security policy for a particular network may specify that all email traffic must flow through a network element having a particular network address that is specifically configured as a mail host. In a sense, these rules establish trust relationships between specific network elements, or groups thereof.
The facility preferably provides a user interface for constructing one or more network security policy templates (hereinafter simply “templates”) that can each be used to generate similar policies for any number of specific networks. A template contains rules expressed in terms of “aliases,” rather than in terms of specific network elements. For example, a template may include a rule specifying that all email traffic must flow through a “MailHost” alias that is not associated with a particular network address.
To generate a policy for a particular network from a template, the facility uses a profile of the network that maps the aliases occurring in the template to specific network elements within the network. For example, the network profile for a particular network maps the “MailHost” alias to a particular network element of the network having a particular network address. The facility preferably provides a user interface that makes it convenient for a user to generate network profiles.
The facility uses the profile for the network to replace occurrences of aliases in the template with the addresses of the corresponding specific network elements. The facility preferably sends the resulting network-specific policy to the network security device of the network for implementation. In certain embodiments, the policy may be further modified before transmission to the networks security device.
This process can be repeated to generate policies for each of a number of other networks. At a later time, the underlying template can be revised to add or change rules. Together with the network profiles, this revised template can be used to automatically generate revised policies corresponding to the revised template for all of the networks.
The facility is especially well suited for use by Internet service providers and other organizations responsible for providing network security to a large number of networks, as it enables these organizations to configure the network security devices for additional networks at a very low cost. The facility also enables such organizations to efficiently update the configuration of a large number of operating network security devices by merely modifying and reapplying one or more templates.
The network profile 110 for network 1 contains a definition of the “InformationServices” alias 111. It can be seen that this definition defines the “InformationServices” alias to include the network elements at the following IP addresses:
220.15.23.52
220.15.23.53
220.15.23.97
In general, a network profile contains an alias definition like alias definition 111 for each alias used in the security policy template.
When the security policy template 100 and the network profile 110 for network 1 are combined to create the security policy 115 for network 1, the facility replaces the “InformationServices” alias in rule 101 with the network addresses listed for the “InformationServices” alias in definition 111. Doing so produces rule 116 in the security policy 115 for network 1, which indicates that outgoing FTP connections are allowed only from the network elements having IP addresses 220.15.23.52, 220.15.23.53, and 220.15.23.97. In the same manner, for each additional rule in security policy template 100, the facility replaces each occurrence of an alias with the network addresses of the network elements defined to be within the alias in the network profile 110 for network 1. As a result, the rules in security policy 115 for network 1, which are to be implemented in network 1, specifically refer to network elements within network 1. In this sense, they differ from the rules in security policies 125 and 135, which specifically refer to network elements within networks 2 and 3, respectively.
In order to further describe the facility, its operation is discussed below with respect to an example depicted in
The table 1530 represents the substance of the “minimal” template. In a sense, the table constitutes a data structure storing this template. Those skilled in the art will recognize that such a template may be stored in data structures having a variety of different formats.
Now that the “minimal” template is complete, it can be used by the facility to generate policies for particular networks. As part of the example, the user repeats the template generation process to generate two additional templates.
After the user defines addresses for each of the aliases in alias list 1920, the user has generated a network profile. The facility preferably proceeds to combine this network profile with the “minimal” template to create a policy for the new network, which it forwards to the network security device in the new network to configure the network security device to implement the policy in the protected network.
While this invention has been shown and described with reference to preferred embodiments, it will be understood by those skilled in the art that various changes or modifications in form and detail may be made without departing from the scope of the invention. For example, those skilled in the art will recognize that the facility may be straightforwardly adapted to work with other types of security devices in addition to those described herein. Further, the facility may be adapted to use various other user interface techniques and data structures in addition to those described herein. Also, the facility may be straightforwardly adapted to operate in a variety of different types of networking environments.
Claims
1-13. (canceled)
14. A method in a computer system for adapting a generalized network security policy to a particular network, comprising:
- retrieving the generalized network security policy comprising a plurality of network security rules each specified with respect to aliases each representing a role for one or more network elements in a network;
- providing a user interface for specifying, for each alias included in the generalized network security policy, a list of one or more network elements in the network serving the role represented by the alias; and
- replacing each alias in the generalized network security policy with the list of network elements specified for the alias using the user interface to produce a network security policy adapted to the network.
15. The method of claim 14, further comprising the step of selecting the generalized network security policy from among a plurality of alternative generalized network security policies based upon the nature of the network.
16. The method of claim 14, further comprising implementing the produced network security policy in the network to provide network security services in the network in accordance with the generalized network security policy.
17. The method of claim 14, further comprising:
- providing a user interface for specifying additional rules relating to the network; and
- merging the additional rules specified using the user interface into the network security policy.
18. A computer-readable medium whose contents cause a computer system to adapt a network security policy model for use in a particular network, comprising:
- retrieving the network security policy model, which comprises a plurality of network security rules each specified with respect to one or more aliases each representing a role in a network for one or more network elements;
- receiving, for each alias included in the network security policy model, a list of one or more network elements in the network serving the role represented by the alias; and
- replacing each alias in the network security policy model with the received list of network elements specified for the alias to produce a network security policy adapted for use in the network.
19. The computer-readable medium of claim 18 wherein the contents of the computer-readable medium further cause the computer system to select the retrieved network security policy model from among a plurality of alternative network security policy models in response to user input.
20. The method of claim 18 wherein the contents of the computer-readable medium further cause the computer system to implement the produced network security policy in the network to provide network security services in the network in accordance with the network security policy model.
21-23. (canceled)
24. A computer memory storing a security policy template data structure, the data structure comprising a plurality of computer security directives specifying action to be taken in connection with network traffic between pairs of network nodes, the nodes of each pair being specified in terms of the roles of the nodes rather than in terms of the identity of the nodes, such that, for a subject computer network, the identities of the nodes in the subject computer network having the roles contained in the policy template data structure can be substituted for roles contained in the policy template data to produce a network security policy adapted to the subject network.
25. A computer memory storing a network security policy data structure for a protected network, the data structure comprising one or more network security rules, each rule expressed in terms of specific network elements of the protected network, each rule having been converted from a model rule expressed in terms of types of network elements by substituting in the model rule for each type of network element a network element of the protected network of that type, such that the network security policy data structure may be implemented to provide networks security services in the protected network.
26. A data transmission network conveying a network security policy data structure for a protected network to a security device for the protected network, the data structure comprising one or more network security rules, each rule expressed in terms of specific network elements of the protected network, each rule having been converted from a model rule expressed in terms of types of network elements by substituting in the model rule for each type of network element a network element of the protected network of that type, such that the network security policy data structure may be implemented to provide networks security services in the protected network.
27. A method in a computer system for obtaining information usable to produce a network security policy for a network comprising:
- displaying a plurality of network element aliases used in a network security policy template;
- with respect to each of the displayed network element aliases, receiving user input specifying one or more network addresses of network elements within the network; and
- storing the specified network addresses.
28. A computer-readable medium whose contents cause a computer system to perform a method for producing network security policy for a network the method comprising:
- displaying a plurality of network element aliases used in a network security policy template; with respect to each of the displayed network element aliases, receiving user input specifying one or more network addresses of network elements within the network; and
- storing the specified network addresses.
29. The method of claim 27, further comprising:
- with respect to each of the displayed network element aliases, substituting for occurrences of the network element alias in a network security policy the network addresses specified for the network element alias; and
- after the substitution, persistently storing the network security policy.
30. The computer-readable medium of claim 28 wherein the method further comprises:
- with respect to each of the displayed network element aliases, substituting for occurrences of the network element alias in a network security policy the network addresses specified for the network element alias; and
- after the substitution, persistently storing the network security policy.
Type: Application
Filed: Oct 17, 2007
Publication Date: Aug 28, 2008
Inventors: David Wayne Bonn (Everett, WA), Nick Takaski Marvais (Shoreline, WA)
Application Number: 11/873,512