{"id":2955,"date":"2021-11-19T10:14:10","date_gmt":"2021-11-19T18:14:10","guid":{"rendered":"https:\/\/44.203.207.232\/?p=2955"},"modified":"2021-11-26T22:26:15","modified_gmt":"2021-11-27T06:26:15","slug":"network-automation-network-compliance","status":"publish","type":"post","link":"https:\/\/webdev.siff.io\/network-automation-network-compliance\/","title":{"rendered":"Network Automation != Network Compliance"},"content":{"rendered":"\n
In a recent study by EMA, The State of Network Automation: Configuration Management Obstacles are Universa<\/em>l<\/a>, the report indicated that there is significant dissatisfaction with the current state of Configuration Management, especially at the large network operators. The concerns revealed that 3 out of 4 IT organizations are worried that configuration changes are likely to lead to performance problems and security issues. <\/strong>These errors can impact any organization, even those with a leading reputation for network operations such as Facebook where they suffered a global outage in October 2021<\/a>. Facebook publicly attributed the outage due to a bad network configuration change. <\/p>\n\n\n\n The study goes on to prescribe that Network Automation is the key path towards improving Network Compliance and Audits. Although automation tools do help provide more consistency and reduce human configuration errors, this path ignores critical attributes of network operations in the real world. Specifically:<\/p>\n\n\n\n The real issue is that Network Compliance and by extension, configuration monitoring, should not be conflated with Network Automation. They serve different purposes. Network Compliance and Audits need to ensure the correct configuration on actual devices and not just \u201cgolden configs\u201d defined in automation tools. In other words, <\/p>\n\n\n\n The \u201cconfiguration truths\u201d are on the actual devices and not in a CMDB or an Inventory system.<\/strong> The Network Compliance policies and audits must validate what is on the actual devices and verify all changes made to those devices regardless of whether it is manual, automated, or worst case, hacked.\u00a0<\/p>\n\n\n\n At SIFF.IO, this is the methodology or approach we use to ensure Network Compliance.<\/p>\n\n\n\n With SIFF, you have visibility into all configuration changes across all sources (networks, servers, apps, cloud, VMs, and containers) to meet your security compliance and audit requirements. This change visibility is not limited to those that are planned or automated.<\/p>\n\n\n\n Configuration Monitoring and Compliance is different from Configuration Automation. There are certainly overlaps but what they do should not be confused.\u00a0To learn more about how SIFF.IO can help monitor all infrastructure configuration changes and ensure policy compliance, In a recent study by EMA, The State of Network Automation: Configuration Management Obstacles are Universal, the report indicated that there is significant dissatisfaction with the current state of Configuration Management, especially at the large network operators. The concerns revealed that 3 out of 4 IT organizations are worried that configuration changes are likely to […]<\/p>\n","protected":false},"author":5,"featured_media":2956,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/posts\/2955"}],"collection":[{"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/comments?post=2955"}],"version-history":[{"count":7,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/posts\/2955\/revisions"}],"predecessor-version":[{"id":2966,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/posts\/2955\/revisions\/2966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/media\/2956"}],"wp:attachment":[{"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/media?parent=2955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/categories?post=2955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/tags?post=2955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
Not in network management tools or network automation tools.<\/strong><\/p>\n\n\n\n
Visit SIFF.IO<\/a> to find out \u201cWhat the #%&$ changed?!\u201d<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"