What is the difference between static and dynamic verification of network security?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Static validation techniques look at configurations and network topologies in order to identify security configuration errors, while dynamic verification supplements that with actual traffic logs. These techniques are commonly used to verify firewall configurations. Static validation has the advantage of being performed offline, and it can be completed prior to deploying a security configuration. It can detect errors such as shadowed rules (these are rules that will never be triggered because an earlier rule covers all of the traffic that would be covered by the shadowed rule.)
Dynamic analysis provides deeper insight into a rulebase. For example, only dynamic analysis can detect orphaned rules -- rules that are syntactically correct but will never be triggered due to changes in the way the network operates. For example, static analysis will never reveal that a database server has been decommissioned, while dynamic analysis will identify that the rule has not been triggered in a long time, allowing you to proactively clean up the rulebase.
For more information:
- Should static analysis be part of the software development process? Read more.
- Also, learn more about how to implement virtual firewalls in a complex network infrastructure.
Dig Deeper on Network Firewalls, Routers and Switches
Related Q&A from Mike Chapple
It's hard to tell if a company is a HIPAA business associate, but a closer look at HHS documents helps. Expert Mike Chapple discusses a specific case...continue reading
There was speculation in the security world over whether the FedRAMP certification would be helpful or not. Now that it's in full use, Mike Chapple ...continue reading
Medical device companies are part of the health industry, but does that make them a HIPAA covered entity or business associate? Expert Mike Chapple ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.