dcsimg

Five Tips to Securely Decommission Business Applications

  • Five Tips to Securely Decommission Business Applications

    Five Tips to Securely Decommission Business Applications-

    Leveraging the comment fields within the firewall rule base (if they’re filled out properly) gives you a valuable source of information regarding the rule – its purpose, what it’s tied to perhaps, if it’s only intended to be there for a certain period of time, etc.

1 | 2 | 3 | 4 | 5 | 6 | 7

Five Tips to Securely Decommission Business Applications

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • Five Tips to Securely Decommission Business Applications-5

    Leveraging the comment fields within the firewall rule base (if they’re filled out properly) gives you a valuable source of information regarding the rule – its purpose, what it’s tied to perhaps, if it’s only intended to be there for a certain period of time, etc.

Accurately identifying and removing access rules for decommissioned applications, without impacting the accessibility of other applications, is a huge issue for many organizations. Oftentimes, unnecessary or overly permissive access rules are left in place due to the fear of making a change that impacts the network or applications.

In this slideshow, AlgoSec, a security policy management company, examines the challenges of decommissioning business applications and offers five tips for improving security without affecting network operations by removing firewall rules that are no longer in use.