
Guardium’s policy analyzer is a feature that helps you better understand how your policies are functioning. It provides data to help identify frequently fired rules, optimize rule order, and evaluate rule changes. Policy analyzer provides useful data about installed policy rules; it is not a data simulator.
Policy analyzer became available in v11.0. It works with standalone Guardium systems or managed units in a centrally managed environment. Policy analyzer does not analyze push-down policies from z/OS S-TAPs, session-level polices, or FAM policies.
This article provides a quick overview of the policy analyzer.
Policy analyzer can run in 2 modes: continuous and ad hoc.
- Continuous analysis runs continually in the background. It records and evaluates data at predefined intervals and is useful for observing longer-term trends in policy activity.
- Ad hoc analyses run once, at a time you define, and are useful for evaluating specific policy changes. You can use the time and duration settings to evaluate traffic before and after modifying a policy to better understand the impact of the policy change.
You can use one mode or both together to gain a deeper understanding of your policy rules.
For both continuous and ad hoc analyses, the policy analyzer results page is broken into 3 sections.
- The % fired among transactions for each rule shows how often rules are firing, expressed as a percentage of all transactions evaluated in the specified time frame. The total may not be 100, since not all transactions result in a rule firing.
- The Top rules (fire count) chart shows the number of times that a rule fired during the analysis. By default, it shows the top 5 rules based on rule firing count..
- The Details for all policy rules table shows details for each rule: its statistics as well as its installation order, name, actions and which policy it is a part of.
Let’s take a look at a real result from a small QA system.
On this test system, during the selected time period, only 2 client IP addresses triggered this policy rule. The first client triggered the rule about twice as often as the second. However, the DB user and source program values are more evenly distributed.
On your Guardium system, you could see that a source program was triggering a rule significantly more than other programs. This could be a sign that the program is a batch program and should not be logged. Another trend you might see is that a particular user is resulting in a lot of triggered rules. It may make sense to add this user to a group to watch them more carefully. Alternatively, if that user has approved advanced access privileges, you may want to add that user to an admin group and track their access differently.
We’d love your feedback on this topic – have you used the policy analyzer? What has it helped you to uncover?
#Guardium