Manual Chapter : Overview of security policy audit

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 8.0.0
Manual Chapter

Overview of security policy audit

The security policy audit allows you to evaluate and edit a security policy based on system-provided recommendation. In addition, you can use the audit to analyze policy changes, deploy changes, ignore recommendations, and export the audit results. The image below provides an overview of the information and available actions within the Policy Analyzer audit. For more information about the system-provided recommendations, see section
Security Policy Analyzer recommendations
.

Policy Summary

The policy analyzer audit provides a summary of pending recommendations. Application protection is evaluated based on the severity and number of pending recommendations. As shown in the image below, the analyzed policy has a security score of "C" due to a number of recommendations from various categories. Use the audit to evaluate whether or not to edit your policy based on the system-provided recommendations.

Edit Policy

Edit the policy based on the system-provided recommendations. By clicking on the text in the
Recommendation
column, you can go directly to the configuration area that will allow you to implement policy or system configuration changes.

Ignore Recommendations

If the system-provided policy recommendations do not meet your application's protection requirements, you can select the recommendation's row and click
Ignore
. This action can change the system assessment of your overall security score, once you review or re-analyze the policy.

Review Policy Edits

If you have saved changes to the policy, or the objects configured to the policy, you can perform a new audit before you deploy changes. To do so, select the
Refresh
option from the
SECURITY POLICY
area in the summary screen. The summary bar and recommendations adjusts the policy analysis according to changes.

Deploy Policy Edits

If you would like to deploy policy changes, select the
Deploy
option from the
SECURITY POLICY
area in the summary screen. This will immediately deploy changes to BIG-IP devices associated with the policy.