SmartWorkflow provides a formal process of policy change management that helps administrators reduce errors and enhance compliance. Changing business needs produce a constant stream of requests to change firewall security policies. These changes can have far reaching implications if not done correctly including: slower firewall performance, network downtime, increased security risks, and lack of compliance with corporate and industry standards. Enterprises that have multiple firewall administrators and an environment of frequent changes need an automated solution that helps them review and authorize policy changes against approved configuration standards. Check Point's SmartWorkflow software blade automates policy change management with visual traceability and full auditability.
Automated change management
Administrators have a constant need to make firewall changes. These changes are often done manually and hurriedly resulting in mis-configurations and duplication of rules. Check Point's SmartWorkflow helps administrators track changes to the rule bases, network objects, security policies, users, administrators, groups, OPSEC applications, VPN communities and servers. Changes are tracked in entities called sessions which are logical units that contain a set of changes made within SmartDashboard.
Easy visualization of changes
Changes made to rules and objects are highlighted in SmartDashboard. Administrators can also scroll through the changes in chronological order or they can generate a Summary Change Report that provides a comprehensive picture of the changes that were made during the current session. Clicking on a link in the Name column of the Summary Change Report will generate a detailed list of how the specific object changed, who changed it, as well as the previous time it was modified and by whom. This enables the administrator to easily review the changes and their impact on the entire rule-base.
SmartWorkflow adds an extra layer of security by ensuring that a changed security policy cannot be installed without a manager's approval (four-eye principle). Authorized managers can either approve the session or request that modifications be made to the session. In addition, SmartWorkflow can adapt to existing change management approval processes. It can be configured so that only managers can approve a change, the administrator can approve his own changes, or in case of an emergency, a policy can be installed without official approval with the appropriate password.
Policy revisions and baseline comparisons
Prior to approving a session a manager can review the Security Configuration Change Summary Report which provides a summary of the objects added, changed or deleted and how those changes compare to the currently installed Security Policy. In addition, they can review the changes between any two sessions or they can view changes of a single session within SmartDashboard in "read-only" mode.
Audit trailsProduct Highlights
Workflow enables administrators to track changes that have been made to objects, security policies and session events over an extended period of time. These changes are recorded in Smartview Tracker as audit logs.
- Enforces a formal process of tracking, approving and auditing security policy changes
- Streamlines change management increasing operational efficiency
- Reduces errors by providing granular visibility into policy changes
- Aligns to an organizations existing change management approval process
- Enhances compliance through audit trails and built-in role segregation
- One-stop, total policy lifecycle management