{"id":5623,"date":"2025-04-10T22:17:55","date_gmt":"2025-04-10T13:17:55","guid":{"rendered":"https:\/\/aireviewirush.com\/?p=5623"},"modified":"2025-04-10T22:17:55","modified_gmt":"2025-04-10T13:17:55","slug":"how-netops-and-secops-evolution-to-resolve-community-compliance-is-driving-effectivity","status":"publish","type":"post","link":"https:\/\/aireviewirush.com\/?p=5623","title":{"rendered":"How NetOps and SecOps Evolution to Resolve Community Compliance is Driving Effectivity"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><em>Co-authored by Gavin Littleboy<\/em><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_53 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\" role=\"button\"><label for=\"item-69e6cc118adc1\" ><span class=\"\"><span style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input aria-label=\"Toggle\" aria-label=\"item-69e6cc118adc1\"  type=\"checkbox\" id=\"item-69e6cc118adc1\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/aireviewirush.com\/?p=5623\/#Challenges_in_Community_Compliance\" title=\"Challenges in Community Compliance\">Challenges in Community Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/aireviewirush.com\/?p=5623\/#Evolution_of_NetOps_and_SecOps_Groups\" title=\"Evolution of NetOps and SecOps Groups\">Evolution of NetOps and SecOps Groups<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/aireviewirush.com\/?p=5623\/#The_Want_for_Automation_to_Scale\" title=\"The Want for Automation to Scale\">The Want for Automation to Scale<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/aireviewirush.com\/?p=5623\/#Patterns_Round_Community_Compliance\" title=\"Patterns Round Community Compliance\">Patterns Round Community Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/aireviewirush.com\/?p=5623\/#Automation_Permits_Steady_Compliance\" title=\"Automation Permits Steady Compliance\">Automation Permits Steady Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/aireviewirush.com\/?p=5623\/#Closing_Ideas\" title=\"Closing Ideas\">Closing Ideas<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/aireviewirush.com\/?p=5623\/#Further_Related_Hyperlinks\" title=\"Further Related Hyperlinks\">Further Related Hyperlinks<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Challenges_in_Community_Compliance\"><\/span>Challenges in Community Compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Authorities businesses face important challenges in sustaining community compliance as a result of ever-increasing complexity of laws. From NIST 800-53, cybersecurity vulnerabilities, to different safety requirement guides like DISA Safety Technical Implementation Guides (STIGs) for Division of Protection, complete measures require configuring and sustaining networks to make sure they keep compliant and are safe in opposition to vulnerabilities and threats. Compounding this difficulty are the restricted budgets and assets accessible inside authorities entities, which may make it troublesome to allocate ample personnel and instruments to handle compliance successfully. Moreover, the necessity to combine numerous applied sciences and legacy techniques additional complicates compliance efforts. These techniques usually lack the flexibleness wanted to adapt shortly to new and evolving threats, making the duty of attaining and sustaining steady compliance an ongoing wrestle. Businesses are taking a look at how automation and orchestration will help with these challenges.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Evolution_of_NetOps_and_SecOps_Groups\"><\/span>Evolution of NetOps and SecOps Groups<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The evolution of NetOps and SecOps groups is reworking how authorities businesses method community compliance and safety.<\/p>\n<p>NetOps, DevOps, SecOps confused? See particulars right here \u2013 <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/data-center\/data-center-networking\/what-is-netops.html\" target=\"_blank\" rel=\"noopener\">What&#8217;s NetOps?<\/a><\/p>\n<p>Historically working in silos, these groups are actually more and more required to collaborate and tackle shared challenges. NetOps groups wish to deploy steady community automation and validation to simplify operations, improve velocity and effectivity to ship companies, and enhance efficiency and resiliency of vital community infrastructure. SecOps groups are continually responding to evolving threats corresponding to vulnerabilities created from configuration errors, uncared for updates, and never having ample visibility into safety posture, delaying response efforts.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Want_for_Automation_to_Scale\"><\/span>The Want for Automation to Scale<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Automation is required to scale these efforts, enabling groups to effectively handle routine duties and reply swiftly to threats as community calls for develop. Many technical challenges exist in automating community compliance. For instance, what are we in search of in relation to community compliance? For networks, we&#8217;re validating end-of-life gear, code variations, CVE\/PSIRTs (Widespread Vulnerabilities and Exposures\/Product Safety Incident Response Groups), Safety Implementation guides corresponding to DoD STIG, and community and organizational requirements. As this checklist of compliance concerns demonstrates, there are a lot of touchpoints that shortly make compliance a difficult job and turns into a \u201cfirefight\u201d situation the place all assets are urgently centered to make amends for compliance earlier than the following audit. Because it pertains to community configurations, there are three patterns in compliance checks.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Patterns_Round_Community_Compliance\"><\/span>Patterns Round Community Compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A given compliance requirement necessitates the evaluation of both a community configuration or community state. These checks usually fall into 3 evaluation patterns: match configuration, match variables, or match enterprise logic.<\/p>\n<p><strong>Configuration matches<\/strong> search for actual matches in configuration. Examples embrace disabling or enabling of companies corresponding to http or password-encryption. <strong>Variable matches<\/strong> search for partial or variable substitution matches in configuration. Examples embrace validating that a number of NTP (Community Time Protocol) servers are configured or that configured BGP (Border Gateway Protocol) neighbors are utilizing authentication. <strong>Enterprise logic matches<\/strong> search for organizationally outlined patterns in configuration. Examples embrace validating {that a} boundary entry management checklist is utilized to the proper interface and that it blocks organizational outlined protocols. This final sample is probably the most advanced to implement and varies extensively between organizations primarily based on the native implementation of the required coverage.<\/p>\n<p>At this time, SecOps groups use their area particular auditing instruments to audit the community and create studies. These studies are then shared with the NetOps staff who should interpret, translate to community area configurations, after which implement the community change. This prolonged course of then repeats.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Automation_Permits_Steady_Compliance\"><\/span>Automation Permits Steady Compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Think about a community automation platform the place NetOps and SecOps can leverage unified tooling to unravel widespread targets and allow steady compliance auditing, reporting, and remediation. Safety groups usually describe compliance \u201cintent\u201d within the type of guidelines that validate whether or not a community configuration satisfies the factors. Community operators must fulfill not solely these compliance necessities, however community design necessities and different elements when making a remaining template to be utilized to the community.<\/p>\n<p>Cisco Crosswork Community Companies Orchestrator (NSO) offers this functionality by enabling community operators to automate and handle advanced networks with ease with a built-in compliance engine to validate community compliance. It provides a flexible and highly effective answer that helps configuration administration, service orchestration, and network-wide coverage enforcement. Cisco NSO 6.x comes with important compliance updates corresponding to compliance templates, an intuitive compliance reporting interface, and continues to introduce options to cowl the patterns above. Cisco NSO has fashionable APIs and a stateful database the place steady compliance will be validated primarily based on real-time community state and reported as much as northbound techniques. Cisco NSO can also be model-driven, which means knowledge fashions and their intents can instantly be translated to supposed implementation state within the community. This allows a brand new paradigm for SecOps groups to have the ability to audit and report compliance checks with the identical tooling and configuration templates that the NetOps staff have outlined for the community for remediation. With Cisco NSO, groups can guarantee constant compliance throughout multi-vendor community parts, streamline operations, and improve collaboration between totally different groups inside a company.<\/p>\n<p>To be taught extra about Cisco Crosswork NSO or to see examples of how you can construct compliance templates, see beneath.<\/p>\n<p><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/cloud-systems-management\/network-services-orchestrator\/network-orchestrator-so.html\" target=\"_blank\" rel=\"noopener\">Crosswork NSO Answer Overview<\/a><\/p>\n<p><a href=\"https:\/\/gitlab.com\/nso-developer\/compliance-reporting-examples\" target=\"_blank\" rel=\"noopener\">Compliance Reporting Examples Repository<\/a> on NSO Developer GitHub<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Closing_Ideas\"><\/span>Closing Ideas<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Because the roles inside NetOps and SecOps evolve, fostering a tradition of studying and adaptableness ensures that personnel can successfully handle new applied sciences and regulatory necessities. By constructing cross-functional experience and problem-solving capabilities, businesses can tackle present compliance wants and anticipate future calls for, resulting in extra resilient and responsive operations. Reaching efficient compliance options and leveraging automation yields substantial returns on funding (ROI) for presidency businesses, leading to notable value financial savings and enabling businesses to allocate assets extra strategically and concentrate on their core missions. This not solely protects the company\u2019s status but in addition ensures the uninterrupted supply of important companies.<\/p>\n<p>To dive deeper into community compliance and automation, be part of us at <strong>Cisco Dwell San Diego from June 8-12, 2025<\/strong> for 2 insightful classes exploring methods and options to boost your community operations:<\/p>\n<p>DEVNET-2144 \u2013 \u201cAutomating Community Compliance: Leveraging Cisco NSO for Compliance Auditing, Reporting, and Remediation\u201d<\/p>\n<p>DEVWKS-2083 \u2013 \u201cThe Journey of Automating Community Compliance utilizing Cisco NSO\u201d<\/p>\n<blockquote>\n<p><a href=\"https:\/\/www.ciscolive.com\/global\/attend\/registration-packages.html\" target=\"_blank\" rel=\"noopener\">Register for Cisco Dwell<\/a><\/p>\n<\/blockquote>\n<p>If you need to be taught extra about how Cisco will help your compliance wants or to get began in your Automation Journey, attain out to your Account Group.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Further_Related_Hyperlinks\"><\/span>Further Related Hyperlinks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/blogs.cisco.com\/customerexperience\/congratulations-to-the-2024-americas-cx-customer-hero-award-winners\" target=\"_blank\" rel=\"noopener\">Examine final 12 months\u2019s Cisco CX Buyer Hero profitable the World Class Cybersecurity award for a Division of Protection Fight Assist Company<\/a><\/p>\n<p><a href=\"https:\/\/blogs.cisco.com\/government\/transforming-operations-to-eliminate-technical-debt\" target=\"_blank\" rel=\"noopener\">Different Automation Blogs<\/a><\/p>\n<p><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cisco-cybersecurity-for-government.html\" target=\"_blank\" rel=\"noopener\">Study extra about different Cisco options to assist authorities businesses with compliance<\/a><\/p>\n<p><a href=\"https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/doing_business\/trust-center\/docs\/cisco-saas-roadmap.pdf\" target=\"_blank\" rel=\"noopener\">Cisco SaaS Compliant Product Availability<\/a><\/p>\n<p>Share:<\/p>\n<p>\n  \t<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Co-authored by Gavin Littleboy Challenges in Community Compliance Authorities businesses face important challenges in sustaining community compliance as a result of ever-increasing complexity of laws. From NIST 800-53, cybersecurity vulnerabilities, to different safety requirement guides like DISA Safety Technical Implementation Guides (STIGs) for Division of Protection, complete measures require configuring and sustaining networks to make [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5625,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":{"0":"post-5623","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-iot"},"_links":{"self":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/5623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5623"}],"version-history":[{"count":1,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/5623\/revisions"}],"predecessor-version":[{"id":5624,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/5623\/revisions\/5624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/media\/5625"}],"wp:attachment":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}