Demo

How to Audit Network Security Vulnerabilities from Cisco PSIRTs with Itential’s Automated Configuration Compliance

Keeping your network secure is just as time consuming as it is crucial, and with Cisco’s Security Advisory Bundled Publication in September it becomes a top priority for most teams. It’s a perpetual responsibility for network and security teams to ensure that your network is not only operating efficiently, but operating as securely as possible. However, the rapid state of updates and changes in infrastructure makes it a challenge to ensure that network and security device configurations are standardized and maintain compliance.

If you’re still using manual methods to review and audit, you already know it’s error prone and simply does not scale. With Itential’s multi-vendor automation and orchestration platform, network and security teams can audit network and security device configuration and operational data using templates that can are updated by vendors almost as quickly as new vulnerabilities are identified. The Itential platform can then report and automatically remediate changes, with the ability to integrate with ticketing, inventory, and messaging systems.

In this demo, Joksan Flores, Senior Solutions Engineer at Itential, demos step-by-step how teams can:

  • Create Golden Configuration templates for both network and security devices.
  • Automate auditing live device configurations for known vulnerabilities.
  • Audit operational state of devices for vulnerabilities using Command Templates.
  • Orchestrate with notification systems like MS Teams or Slack for reporting.
  • Enable self-service, on-demand audit of device configuration with APIs.

Demo Notes

(So you can skip ahead, if you want.)

00:00 Introduction & Demo Overview
08:15 Designing A Golden Config CLI Template Based on A PSIRT Advisory
13:35 Associating Multiple Devices to the Golden Config Template
15:24 Creating a Command Template to Gather Operational Data Based on a PSIRT Advisory
21:05 Walkthrough Workflow to Orchestrate an Audit Check, Report, & Notification
25:50 Publishing the Workflow in Operations Manager for Manual, API, & Scheduled Execution
30:20 Running the Audit & Report Workflow Manually
32:00 Review the Audit Report Example & Verify Email Notification
36:45 Conclusion