Abstract

Dynamic and selective steering of traffic through a security device can create a certain level of interdependence between the security operations (SecOps) and network operations (NetOps) that traditionally operate as independent teams. For example, any deviation in the strict enforcement of the true traffic steering intent advised/authored by a SecOps team and configured by a NetOps teams on network devices can result in compliance issues and possibly security breaches. This submission proposes novel techniques that allow a SecOps team to independently audit and validate steering enforcement actions configured and managed by a NetOps team in order to ensure compliance with the original traffic steering intent/policies as provided by the SecOps team.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS