Datanauts 123: Security Without Firewalls




The Fat Pipe - All of the Packet Pushers Podcasts show

Summary: Firewalls are the linchpin of a traditional network security infrastructure. They guard the perimeter of the network and stand sentry at key locations within the campus and the data center.<br> But can you operate a secure infrastructure without firewalls? On today’s Datanauts show, we’ve brought on a pair of guests to make that case.<br> Our guests are <a target="_blank" href="https://twitter.com/buraglio" rel="noopener">Nick Buraglio</a>, Lead face melter at Energy Sciences Network (that’s the title he put in the show notes); and <a target="_blank" href="https://twitter.com/JonZeolla" rel="noopener">Jon Zeolla</a>, CTO at <a target="_blank" href="https://www.seisollc.com/" rel="noopener">Seiso</a>.<br> We start by defining firewalls and their core functions, and then examine arguments for not having them. We then examine other options for inspecting perimeter traffic and drill into options including Bro, Suricata, vulnerability assessment, and host-based tools.<br> We also look at the operation and compliance impacts of getting rid of firewalls. Last but not least, we talk about the importance of log and data analysis and ways to extract meaningful information and put it to use.<br> By the end of the show, you might just be running into the data center and unplugging your firewall cables.<br> Show Links:<br> <a target="_blank" href="https://linkedin.com/in/jonzeolla" rel="noopener">Jon Zeolla on LinkedIn</a><br> <a target="_blank" href="https://www.forwardingplane.net/" rel="noopener">ForwardingPlane.net</a> – Nick Buraglio’s blog<br> <a target="_blank" href="https://www.bro.org/" rel="noopener">Bro Network Security Monitor</a> – bro.org<br> <a target="_blank" href="https://www.youtube.com/watch?v=IPh3aZ18IuY" rel="noopener">Best practices for Securing the Science DMZ by Nick Buraglio</a> – YouTube<br> <a target="_blank" href="https://www.youtube.com/watch?v=-_ROZuYUNXY" rel="noopener">January Presentation Security Data Analysis for the masses</a> – Jon Zeolla, YouTube<br>