Requires Free Membership to View
Static validation techniques look at configurations and network topologies in order to identify security configuration errors, while dynamic verification supplements that with actual traffic logs. These techniques are commonly used to verify firewall configurations. Static validation has the advantage of being performed offline, and it can be completed prior to deploying a security configuration. It can detect errors such as shadowed rules (these are rules that will never be triggered because an earlier rule covers all of the traffic that would be covered by the shadowed rule.)
Dynamic analysis provides deeper insight into a rulebase. For example, only dynamic analysis can detect orphaned rules -- rules that are syntactically correct but will never be triggered due to changes in the way the network operates. For example, static analysis will never reveal that a database server has been decommissioned, while dynamic analysis will identify that the rule has not been triggered in a long time, allowing you to proactively clean up the rulebase.
For more information:
- Should static analysis be part of the software development process? Read more.
- Also, learn more about how to implement virtual firewalls in a complex network infrastructure.
This was first published in August 2009
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation