Five Tips to Securely Decommission Business Applications

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips to Securely Decommission Business Applications-3 Next

Identify the rules that are only used by the decommissioned application. Armed with this information, you can ensure that you don’t remove rules needed by other applications to function properly. A nice side effect is that you can safely eliminate policy clutter, which can increase the time to prepare for audits, assess the policy for risk, troubleshoot connectivity issues and degrade firewall performance.

Accurately identifying and removing access rules for decommissioned applications, without impacting the accessibility of other applications, is a huge issue for many organizations. Oftentimes, unnecessary or overly permissive access rules are left in place due to the fear of making a change that impacts the network or applications.

In this slideshow, AlgoSec, a security policy management company, examines the challenges of decommissioning business applications and offers five tips for improving security without affecting network operations by removing firewall rules that are no longer in use.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

ArriaNLG-IoTAutomation0x Internet of Things Personified: Integration and Automation

The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it. ...  More >>

SAPSocialCollabSuccess0x 6 Strategies for Being Successful with Social Collaboration

Enterprise social collaboration solutions are most successful when they contribute to business value and benefits that address company goals. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.