www.tufin.com
Open in
urlscan Pro
2606:4700:10::ac43:1ae2
Public Scan
Submitted URL: https://go.tufin.com/NzY5LUlDRi0xNDUAAAGT7qznHM2zhhHIXM2J0bCDMHEm_1zksaXx9ePgLJ9A_U00Joi95HIDBHDPZYACVdEGGDIQTA8=
Effective URL: https://www.tufin.com/blog/growing-healthy-attack-surface-management-plan-with-tufin?utm_source=marketo&utm_medium=ema...
Submission: On June 25 via api from US — Scanned from DE
Effective URL: https://www.tufin.com/blog/growing-healthy-attack-surface-management-plan-with-tufin?utm_source=marketo&utm_medium=ema...
Submission: On June 25 via api from US — Scanned from DE
Form analysis
4 forms found in the DOM<form id="mktoForm_3918" class="mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 302px;">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
color: #fff;
border: 1px solid #75ae4c;
padding: 0.4em 1em;
font-size: 1em;
background-color: #99c47c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
outline: none;
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
background-color: #75ae4c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="FirstName" id="LblFirstName" class="mktoLabel mktoHasWidth" style="width: 100px;">
<div class="mktoAsterix">*</div>First Name:
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="FirstName" name="FirstName" maxlength="255" aria-labelledby="LblFirstName InstructFirstName" type="text" class="mktoField mktoTextField mktoHasWidth mktoRequired"
aria-required="true" style="width: 150px;" placeholder="first name"><span id="InstructFirstName" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
<div class="mktoAsterix">*</div>Work Email Address:
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
aria-required="true" style="width: 150px;" placeholder="email"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset mktoHasWidth" style="width: 10px;"></div>
<div class="mktoFieldWrap">
<div class="mktoHtmlText mktoHasWidth" style="width: 260px;">
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.3/jquery.min.js"></script>
<script>
// <![CDATA[
$(document).ready(function() {
if (!$(".form-blog .thanks_messages").length) {
// Update Your Thanks Message
var thanksMessage = "You're in! Get ready for weekly Tufin updates!";
// Our Code
var $thanksDiv = $("<div class='thanks_messages'>" + thanksMessage + "</div>");
$(".form-blog").append($thanksDiv);
}
MktoForms2.whenReady(function(form) {
var bannerForm = MktoForms2.getForm(3918);
bannerForm.onSuccess(function(values, followUpUrl) {
bannerForm.getFormElem().hide();
document.querySelector('.thanks_messages').style.display = 'block';
return false;
});
});
});
// ]]>
</script>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe Now</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="3918"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="769-ICF-145">
</form>
<form id="mktoForm_1288" class="mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 351px;">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
color: #fff;
border: 1px solid #75ae4c;
padding: 0.4em 1em;
font-size: 1em;
background-color: #99c47c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
outline: none;
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
background-color: #75ae4c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
<div class="mktoAsterix">*</div>
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_campaign__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="em_2024_06_consumer_newsletter_americas_emea" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="email" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="marketo" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset mktoHasWidth" style="width: 10px;"></div>
<div class="mktoFieldWrap">
<div class="mktoHtmlText mktoHasWidth" style="width: 350px;">By submitting, I acknowledge Tufin’s <strong><a href="https://www.tufin.com/privacy-policy" rel="noopener" target="_blank">Privacy Policy</a></strong>.</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap"><label for="Person_Has_Moved__c" id="LblPerson_Has_Moved__c" class="mktoLabel mktoHasWidth" style="width: 100px;">
<div class="mktoAsterix">*</div>Person Has Moved:
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><select id="Person_Has_Moved__c" name="Person_Has_Moved__c" aria-labelledby="LblPerson_Has_Moved__c InstructPerson_Has_Moved__c" class="mktoField mktoHasWidth"
style="width: 150px;">
<option value="">Select...</option>
<option value="Yes">Yes</option>
<option value="No">No</option>
<option value="Uncertain">Uncertain</option>
</select><span id="InstructPerson_Has_Moved__c" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="LT_Lead_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="Inbound Web" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="1288"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="769-ICF-145">
</form>
<form class="mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;">
</form>
<form class="mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;">
</form>
Text Content
* Contact * Support * Careers * Search * Login * * English * Why Tufin * Products * * PRODUCT TIERS * SecureTrack+ * SecureChange+ * Enterprise * AKIPS by Tufin * * PLATFORM * Technology Partners * Extensions * Pricing * Solutions * * FIREWALL MANAGEMENT * Cleanup and Optimization * Network Segmentation * Firewall Change Automation * Firewall Migration * Network Topology * * COMPLIANCE * Continuous Compliance * Audit Readiness * Regulatory Compliance * Risk Assessment * Vulnerability Management * * NETWORK AUTOMATION * Automate and Provision Network Changes * Maximize Business Agility * * CLOUD SECURITY * Hybrid Cloud Security * Multi-Cloud Security * Cloud and DevOps Security Automation * Partners * Channel Partners * Find a Partner * MSSP Program * Partner Portal * Technology Partners * Resources * Blog * Case Studies * Customers * Guides * Events * Solution Briefs * Videos * Webinars * White Papers * Training * Contact * Support * Careers * Search * Login List additional actions * English * 日本語 * Français * Español * Deutsch * 简体中文 * 繁體中文 Get A Demo Get A Demo HOW TO GROW A HEALTHY ATTACK SURFACE MANAGEMENT PLAN WITH TUFIN. 1. Home 2. Blog 3. Cybersecurity 4. How to Grow a Healthy Attack Surface Management Plan with Tufin Last updated June 9th, 2024 by Erez Tadmor * Cybersecurity * Network Segmentation and Topology Attack surface management is much like planning and planting a vegetable garden. While you want your garden to grow, you need to understand the types of plants you can grow successfully, plan space for them accordingly, and respond to their needs based on your environment. Simultaneously, you need to mitigate harm arising from invasive plants, animals, and improper drainage. Simultaneously, you need to mitigate harm arising from invasive plants, animals, and improper drainage. Attack surface management in your IT ecosystem is the same. You need to understand your current physical attack surface and digital environment then create appropriate boundaries to protect critical applications from cyberattacks while keeping out threat actors, identifying unnecessary firewall rules, and responding swiftly to cybersecurity incidents. Effective network security enables you to reduce the number of potential access points, misconfigurations, and vulnerabilities that malicious actors can use to compromise sensitive data. With Tufin, you can create a healthy digital environment by planning, defining, and implementing network segmentation for zero trust architectures that reduce the organization’s attack surface. By managing security zones more effectively and efficiently, you improve cybersecurity and compliance with: * Proactive capabilities, like engaging in a risk assessment before making network changes. * Reactive functionalities, like detecting and remediating existing violations that can lead to data breaches. 1. SET TRUST BOUNDARIES USING SECURITY ZONES FOR CYBERSECURITY In a digital ecosystem, trust boundaries define logical data flows that enable you to set appropriate user and device access controls and permissions at various entry points. In the garden context, this looks like planting vegetables according to the amount of sun they need or their ability to support each other. In a hybrid environment, your network likely includes diverse endpoints and technologies, such as: * Legacy firewalls * Next-generation firewalls (NGFWs) * Software-Defined Network controllers * SASE * Public cloud infrastructure * Edge devices In a complex IT environment, ensuring that you appropriately group together critical applications and create consistent boundaries across networks and devices becomes more challenging. When different technologies use different schemas and formats, you lose visibility into network connections and data flows that can create cybersecurity gaps. Network segmentation is a critical and complex compliance security control that focuses attack surface management. By aggregating high-risk assets to a few security zones, your team can reduce risks, like attackers using laptops, mobile devices, or IoT devices as entry points on one network segment before engaging in lateral movement to other segments. Creating security zones reduces the physical attack surface by reducing the number of endpoints and entry points cybercriminals can exploit. Tufin’s network segmentation capability provides vendor-agnostic rules based on predefined regulatory compliance templates so you can accelerate compliance while reducing the organization’s attack surface area. With Tufin’s Unified Security Policies (USPs), you can create standardized security policies across hybrid-cloud devices and manage them from a single interface for consistency. Equally important, Tufin’s network topology maps give you visibility into and across your networks. Just like you would lay out your garden with graphing paper to group plants with the same needs, these maps help you understand the different connections across your environment for visibility into critical asset groupings. This grouping can limit the impact of malware or ransomware from phishing attacks by reducing inbound and outbound traffic to high-risk endpoints, enhancing risk management. By gaining these insights, you can engage in risk assessments that include attack vectors and potential vulnerabilities to reduce your digital attack surface more effectively and efficiently by ensuring that your security segments engage with each other as intended. 2. CLEANUP RULES AND OBJECTS REGULARLY TO REDUCE ATTACK VECTORS Onboarding applications or other technologies often lead to rule proliferation across the organization’s network when addressing security or business requirement concerns without including the appropriate documentation. These disabled, underutilized, or shadow rules are the invasive plants of your IT environment. As digital weeds, these rules expand your digital attack surface, reducing your networks’ health and depleting resources. To maintain a healthy environment as your business scales, risk management processes should identify and review the need for unhealthy rules and decommission unused, shadowed, or outdated rules. This attack surface reduction method decreases the likelihood attackers can use potential vulnerabilities to gain unauthorized access. The same way weeding a garden ensures that your critical plants have space to grow, decommissioning rules enable you to improve network and cybersecurity health by making it easier to enforce the principle of least privilege access control consistently across network devices mitigating cyber threats. Reducing the number of unnecessary rules is a critical part of any attack surface analysis. Tufin automates policy cleanup, policy optimization, and reduces ongoing rule maintenance efforts by 85%, allowing you to allocate resources to more critical activities. Instead of spending time leaning over your keyboard to identify and remove disabled, underutilized, and shadow rules in your network environment, you can focus on more meaningful tasks, like implementing innovative security measures inside the operation. By automating the process of tracking traffic going on a rule, you can place stricter rules on that traffic to reduce the digital attack surface. To consistently enforce the principle of least privilege across network devices and more precisely, control network access, Tufin’s automatic policy generator (APG) enables you to tighten overly permissive rules that can lead to unauthorized users gaining access while reducing manual efforts. 3. RESPOND TO CYBERATTACKS AND INCIDENTS FASTER WITH ACCURATE NETWORK DATA In a complex network, investigating and responding to incidents is time-consuming, especially without visibility into connections across and between diverse devices. In a vegetable garden, you might try to stop bugs from eating your plants by making an insect repellent out of vinegar. Like covering your plants with garden fabric to reduce time spent spraying repellent, attack surface reduction creates less opportunity for malicious actors to exploit potential vulnerabilities, access digital assets, or successfully spread malware and ransomware. The faster you can contain a cyber threat, the more you reduce a data breach’s financial and operational impact on the organization. Tracing social engineering and cyberattacks and malware is time consuming without information about how data flows across endpoints and users. By providing immediate access to accurate firewall data, Tufin enables you to respond to cyber threats and data breaches faster, improving metrics like meant time to detect (MTTD) and mean time to respond (MTTR). Tufin provides end-to-end network visibility in a single, shared console so network and cloud security teams can collaborate more effectively. With real-time insight into application-level traffic, you can more rapidly identify where an incident originate for critical applications, and the affected network segment by correlating data about: * Users whose weak passwords or accidental clicks on phishing emails may provide unauthorized access to sensitive data * Endpoints that might have known security vulnerabilities on unpatched software or operating systems * Applications that might have vulnerabilities or API misconfigurations that negatively impact security posture These real-time insights enable network and security teams to isolate and contain the threat to digital assets more rapidly. With Tufin’s path analysis capabilities, these teams gain real-time attack surface analysis and insights to understand operational impact and prioritize remediation activities for returning critical digital assets back to their original state. ENHANCED ATTACK SURFACE MANAGEMENT WITH TUFIN Tending to a healthy IT environment takes time and effort, much like caring for a garden. While you may not be able to prevent all harm, you can mitigate risks by reducing the number of attack vectors, misconfigurations, and vulnerabilities. With Tufin, you can improve your security posture, control your digital attack surface and reduce time spent on repetitive mundane tasks, like vulnerability management, by: * Standardizing policies across hybrid environments * Enforcing security zones to protect critical applications * Gaining real-time visibility into and control over your network topology * Eliminating unhealthy rules that attackers could use to compromise networks * Incorporating accurate network data into incident response for faster investigations Attack surface management with Tufin enables you to automate impactful yet manual tasks so that you can allocate resources to more strategic activities. DON'T MISS OUT ON MORE TUFIN BLOGS Subscribe to our weekly blog digest * First Name: * Work Email Address: Subscribe Now You're in! Get ready for weekly Tufin updates! READY TO LEARN MORE Get a Demo In this post: * 1. Set Trust Boundaries Using Security Zones for Cybersecurity * 2. Cleanup Rules and Objects Regularly to Reduce Attack Vectors * 3. Respond to Cyberattacks and incidents Faster with Accurate Network Data * Enhanced Attack Surface Management with Tufin RELATED POSTS Session Recordings Now Available from Tufinnovate 2024 North America and Europe & Middle East ISO 27001 Firewall Security Audit Checklist: Essential for Robust Network Security WAF Checklist: Proactively ManageYour Web Application Security Top Firewall Vulnerabilities for Securing Your Network TOP POSTS How to Perform a Firewall Audit – Policy Rules Review Checklist Understanding AWS Route Table: A Practical Guide What is a Firewall Ruleset? How can it help me? Inbound vs Outbound Firewall Rules: Simplifying Network Security * English GET THE LATEST TUFIN UPDATES * By submitting, I acknowledge Tufin’s Privacy Policy. * Person Has Moved: Select...YesNoUncertain Subscribe CONNECT WITH US * Facebook * twitter * LinkedIn * Youtube * Products * SecureTrack+ * SecureChange+ * Enterprise * Pricing * Extensions * Integrations & Platforms * Scalability * Solutions * Cloud Security * Firewall Management * Compliance * Network Automation * Services * Professional Services * Support * Training & Certification * Customer Portal Login * Developer Resources * Developer Community Login * Resources * Blog * Case Studies * Guides * Knowledge Center * Solution Briefs * Videos * Webinars * White Papers * Partners * Become a Partner * Find a Partner * Partner Portal Login * Company * Contact * About Us * Customers * Careers * Leadership * Board of Directors * Media Center * Events * © Tufin 2024 All rights reserved. * Term & Conditions * ABC Handbook * Privacy Center * Vendor Code of Conduct * Export policy Close Close PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. PERFORMANCE COOKIES Always Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. BACK BUTTON BACK Vendor Search Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Policy Reject All Cookies Accept All Cookies Cookies Settings