Manage network policy sets

CloudFlow's network policy sets enable you to manage network security rules deployed in virtual private clouds, regions, or accounts, across multiple security controls including AWS SG, Azure NSG, Azure Firewall, and Google Cloud Project Firewall.

Each security control detected from your cloud accounts, subscriptions, and projects is automatically added to a policy set. Add, delete, or edit rules in the policy sets as required, and commit the changes to implement them on the associated controls.

Policy sets with similar rules can be merged into a single policy set from which all rules and rule collections defined on the related controls can be viewed and managed.

Network Policies page

To open the Network Policies page, click the Network Policies icon on the left. By default, the page opens with All Entities selected and displays an overview of all your vendors and policy types.

Network policies tree

The network policies tree lets you drill down into individual virtual network types.

The network policies tree contains the following entities:

Security Control Account Type Virtual Network Type
Icon Type Icon Type
AWS SG Account VPC

Azure

  • Azure NSG

  • Azure Firewall

Subscription VNet
Virtual Hub
Azure Firewall (classic) Subscription VNet
Google Cloud Firewall Project VPC

Network tree search bar

Use the network tree search bar to filter the tree and find entries quicker.

Search using partial or whole names of any of the following:

  • Vendors / Policy Types

  • Accounts / Subscriptions / Projects

  • Regions

  • VPCs / VNets / Virtual Hubs

Network policy sets

View network policy sets:

Click on an entity in the Network policies tree to see a list of matching policy sets on the right.

Azure policy sets include two tabs: Azure NSGs policies and Azure Firewall policies.

  • The Azure NSGs policies tab is disabled for Virtual Hubs because Virtual Hubs cannot have NSG policies.

  • The Azure Firewall policies tab is disabled when the Azure VNet does not have a firewall.

Azure Firewall (classic) has its own entry in the Network policies tree.

Google Cloud Firewall policy sets include two tabs:

  • Firewall Policies tab: Shows VPC Firewall rules as well as inherited rules from the Inherited Policies tab that are used by the VPC Firewall

  • Inherited Policies tab: Shows organization-level and folder-level firewall policies

Search policy sets

In the Search Policy box above the list of policy sets, you can filter the displayed policy sets based on search entries.

For each security control, you can search using partial or whole names and descriptions within any of the following:

AWS SG

Azure

Google Cloud

Account

Subscription

Project

Region

Resource group

Google Cloud Firewall name

VPC

Region

 

SG name

NSG / Firewall policy name

 

Filter displayed policy sets

You can filter displayed policy sets to see a more targeted display of the policy sets that interest you.

Each security control type has its own unique set of filters which you can use to refine the policy sets displayed.

Security Control Type Available Filters
AWS SG
  • Accounts

  • Regions

  • VPCs

  • Risks severity

  • Cleanup view (View and manage unused rules. See Clean up policies.)

  • Show risks (toggle) - Show / hide risk information

Azure NSG
  • Subscriptions

  • Regions

  • VNets

  • Risks severity

  • Cleanup view (View and manage unused rules. See Clean up policies.)

  • Show risks (toggle) - Show / hide risk information

Azure Firewall
  • Subscriptions

  • Regions

  • VNets

  • Risks severity

  • Cleanup view (View and manage unused rules. See Clean up policies.)

  • Show risks (toggle) - Show / hide risk information

Azure Firewall (classic)
  • Subscriptions

  • Regions

  • VNets

  • Risks severity

  • Show risks (toggle) - Show / hide risk information

Google Cloud
  • Projects

  • VPCs

    Tip: Hover over a VPC in the dropdown to see a tooltip showing the project name, the project ID defined on the Google Cloud, and its VPC name.

    This is especially helpful when there are multiple VPCs with the same name.

  • Regions

  • Risks severity

  • Show risks (toggle) - Show / hide risk information

  • Show inherited rules (toggle)

    • When activated (default), inherited rules used by the firewall are displayed above the firewall rules

    • When disabled, only the firewall rules are shown

Note: Policy set filters remain in effect until you select a different network in the tree.

Policy set details

Each policy set includes the following areas:

View risks details at the policy level

For AWS, Azure, and Google Cloud

See an aggregated view of the relevant risks associated with each policy.

Do the following:

Click on the risk severity level circles of the desired policy set.

A policy set risk popup appears with information about the policy set and a detailed list of all the risks associated with the policy.

Note: For Google Cloud, toggling Show inherited rules on or off affects whether the list of risks includes risks associated with rules that are inherited or not. For more details on the toggle, see Show inherited rules toggle.

The policy risk details include the following information:

Column name Description
Severity The severity of the risk (critical, high, medium, low).
Risk triggers The number of times the risk was triggered by rules in the policy.
Risk ID The ID number assigned to the detected risk.
Risk title The name of the risk as it appears in the risks list panel.
Description Click the icon to view a full explanation of the nature of the risk.
Remediation Click the icon to view a suggested course of action to resolve the risk.

View rule risks & affected assets

For any rule, you can conveniently view the risk description, the risk remediation suggestion, and all its affected assets.

Do this:

  1. Expand the required policy set and click on the risk severity level circle of the required rule.

    The Risks tab of the Rule Risks & Affected Assets popup window is displayed, showing the relevant risks (Outbound or Inbound):

  2. Click on the Affected Assets tab.
    The affected assets are displayed.

    Tip:
    Hover over the:

    • Description icon to view the risk description.

    • Remediation icon to view the remediation suggestion.

Merge policy sets

For Azure NSG, Azure Firewall (classic), and AWS SG

Since each detected network policy is assigned its own, individual policy set by default, you'll want to merge similar policy sets together to view and manage them together.

Note:

  1. Merging policy sets is only supported within the same policy type. CloudFlow does not support merging policy sets across AWS SG, Azure NSG, and Azure Firewall (classic).

  2. For merged policies, risk severity circles are not displayed and the Risks column is greyed out (not active).

Do the following:

  1. View the policy sets you want to merge, using the search box to search for similar items. For details, see Manage network policy sets.

  2. Expand each policy set to inspect its details and confirm that you want to merge them.

  3. Select the check boxes next to each policy set you want to merge, and then click Merge.

    Tip: If you have many policy sets to select, use the Select all or Unselect all links above the grid as needed.

  4. In the Merge Policy dialog box that appears, enter a name for your new policy set, and an optional description.

    Click Merge to merge the selected policies into a single set.

    The policy set grid is updated with your new set. For example:

Tip: To dissolve your merged policy set and return each policy to its own individual set, commit or discard any changes made, and then edit the properties for your merged set.

For details see Edit policy set properties.

Edit policy set properties

For Azure NSG, Azure Firewall (classic), and AWS SG

Edit the properties for each policy set to change the name, description, or member security controls.

Note: If you want to add or modify policy rules, drill down into the policy set itself.

If your policy set is currently in Edit mode, you will not be able to modify the policy set properties. Commit or discard your changes to make these edits.

For more details, see Edit network policy rules.

Do the following:

  1. View the policy set whose properties you want to edit.

    Tip: You may want to use the search box to find the one you're looking for. For details, see Manage network policy sets.

  2. Click the properties button next to the policy set name.

  3. In the Network Policy Set Properties dialog that appears, do any of the following:

    Name Edit the name listed for the policy set in the grid.
    Description Enter a description for the policy set. This description is shown in the grid when you hover over the Description icon.
    Security Controls

    This area lists the security controls included in the policy set.

    • Click an X to remove a single security control from the set.
    • To completely dissolve the set and return each policy to its own individual set, click Clear all controls. In the message that appears, click Yes to confirm.

    Tip: To add a new security to control to a policy set, merge the relevant sets together. For details, see Merge policy sets.

Edit network policy rules

For Azure NSG, Azure Firewall (classic), and AWS SG

Edit each of your network policies by adding, deleting, and modifying rules and rule collections in the network policy set.

  • Any changes made in a specific rule affect all security controls where the rule is installed.

  • Only one user can edit each policy set at a given time. Policy sets are locked while editing and are opened in read-only mode by default.

    When you're done, click Commit or Discard changes to unlock the policy set for others.

For Azure Firewall (classic) only: Once a rule collection is created, its priority, name, and action are all read only. The rules inside a rule collection, however, can be edited.

Note: If you want to make higher-level changes, such as the policy set name, description, or member controls, view the policy set from its parent level. For more details, see Edit policy set properties and Manage network policy sets.

Do the following:

  1. Browse to and expand a specific network policy set. For details, see Manage network policy sets.

    Rules are displayed in a boxed grid that lists the source, destination, and protocol details for each rule, as well as the security controls each rule is installed on.

    If you are in read-only mode, a large Edit button is shown at the top right of the policy set box. Click the Edit button to make changes to the expanded policy.

    Note: For Azure Firewall (classic), the rules are grouped by rule collection. Expand the collection to drill down to rule details.

  2. Do any of the following:
  3. Do one of the following:

    • Click Discard changes to revert back to the last saved version of the policy set and unlock it for others.

    • Click Commit at the top of the screen to save your changes.

      CloudFlow displays a list of the changes you made. Accept the changes to complete the commit.

      The commit provisions your changes on the security controls and unlocks the policy for others.

Note: Your changes are automatically saved, even if you haven't committed them, closed your browser or logged out of CloudFlow. They will be there for you the next time you browse back to this policy set. However, the policy set remains locked for others until you commit or discard your changes.

Check connectivity for the hybrid network

For Azure NSG Policies

Note: ASMS Integration, a one-time task, needs to be executed before connectivity can be checked for the hybrid network. See ASMS integration to SaaS services

The connectivity check runs a traffic simulation query on ASMS with the subject rule fields (source, destination and service). Cloud-specific elements (e.g. service tags, Virtual Network, ASG, etc.) are translated to the IP-equivalent content based on the target NSG configuration.

The connectivity check in CloudFlow allows you to observe how traffic is routed and whether it’s allowed across your entire hybrid network (that is, across NSGs, firewalls routers etc. deployed on cloud and/or on-prem).

To run a connectivity check

Here are some points to remember when running Connectivity checks:

  • A connectivity check result link is available for 12 hours and visible to all users viewing the subject policy set.

  • If theConnectivity icon is disabled (grey), hovering over it will display the reason this connectivity check cannot currently be performed.

  • If the connectivity icon animation is active, the connectivity check is in progress, wait for results.

  • The connectivity check may take up to an hour, depending on how wide or narrow the rule fields are.

  • When a rule can be expanded using the downward arrow on the right side of the screen, you must expand it and run connectivity on each NSG separately.

Note:

Do the following:

  • In the policy set details, click the enabled (blue)Connectivity icon of the in the Risk column of rule you want to check.

Reviewing connectivity check results

On the CloudFlow Azure network policy page from where the connectivity check is initiated, results are color-coded according to this legend:

Partially Allowed - Some traffic is allowed and some is blocked by the devices in the query path.

Allowed - All traffic is allowed by all the devices in the query path.

Blocked - All traffic is blocked by all the devices in the query path.

Hover over the information icon next to any Results link for further details.

You should be able to login to the connected ASMS instance from your browser.

When you click on the connectivity check result, if you are not yet logged-in to ASMS, you will be directed to do so.

Connectivity checks display the matching ASMS traffic simulation query results in a separate browser tab where all standard ASMS traffic simulation query functionality is available.

Change detection from outside CloudFlow

When changes are detected in a security control managed by CloudFlow, CloudFlow merges the changes into any relevant policy set.

CloudFlow attempts to merge the changes even if the relevant policy set is currently in draft mode or being edited by another user. These changes are reflected in the network policies page when it is freshly accessed. If the network policies page is already open in a browser tab, you may need to refresh it.