Policy is the backbone of every effective cybersecurity framework. It defines how an organisation protects its data, governs access to critical resources, and dictates the rules that every firewall, endpoint, and identity system must enforce. Yet for most organisations, policy management is the one discipline they consistently get wrong.
In this episode of The Security Strategist, Chief Research Analyst Richard Stiennon sits down with Jody Brazil, CEO of FireMon, and John Kindervag, Chief Evangelist at Illumio and the father of Zero Trust, to dissect why cybersecurity policies fail, where the rot begins, and what it genuinely takes to build a security posture that holds.
Policy As the Foundation of Security Architecture
Every discussion of cybersecurity eventually circles back to one uncomfortable truth, which is that technical controls are only as good as the policies that drive them. Firewalls, intrusion detection systems, and endpoint agents all execute instructions someone wrote down. If those instructions are incorrect, outdated, or in conflict, the tools become liabilities rather than defences.
Stiennon opened the conversation by framing this in concrete terms, as most organisations have accumulated years, sometimes decades, of firewall rules written by engineers who have long since left. Nobody knows what the rules do. Nobody wants to remove them in case something breaks. So the attack surface quietly grows, rule by rule, misconfiguration by misconfiguration.
Why Cybersecurity Policies Fail
- Policy rules accumulate over the years, with no regular auditing or ownership.
- Engineers who wrote original rules leave, taking institutional knowledge with them.
- Implicit trust zones create blind spots between internal network segments.
- Manual management of distributed devices introduces critical human error.
- Organisations lack unified visibility across multi-vendor firewall estates.
- Compliance-driven policy creation prioritises documentation over real protection.
One Misconfiguration Can Cost Millions of Dollars
Brazil's journey into policy management began not in a boardroom but at a terminal in the late 1990s, watching a misconfigured firewall bring a major financial institution to its knees. A single incorrectly written rule, one that should have been straightforward, caused a cascading failure that resulted in significant financial losses and reputational damage that took years to repair. The Firemon CEO said:
It was that moment that it hit me. We need a solution to better manage the policies that are enforced on these devices. And that was the genesis of FireMon.
Rethinking Security Policy Ops
How automated policy platforms unify diverse security devices, proving compliance and streamlining control across complex estates.
Zero Trust Was Born From Bad Policy
Kindervag's origin story is equally revealing, and it directly challenges a comfortable myth. Zero Trust is often described as a bold new philosophy, a paradigm shift invented in the halls of Forrester Research around 2010. Kindervag's account is more earthbound as the framework emerged from watching bad policy fail, over and over, in environments that assumed internal network traffic was inherently safe. The Illumio Chief Evangelist shared his thoughts:
It said that you didn't have to have a policy statement or rule when you went from a high-trust zone to a low-trust zone. I thought that was silly — and I started putting out firewall rules on all interfaces. All of these systems should have the same trust level. And it should be zero. That's where Zero Trust comes from. It comes from bad policy.
Firewall Cleanup Recommendations
Firewalls are designed to provide access control. Although there is risk associated with any access, by limiting what access is permitted the risk is
Firewall Advanced Tooling
Brazil and Kindervag converge on a shared conclusion that tools exist to solve this problem. The barriers are organisational inertia, institutional fear of breaking existing connectivity, and a lack of executive mandate to treat policy governance as a first-class security discipline.
FireMon's platform approaches the problem from the management layer, giving security teams unified visibility across multi-vendor firewall estates, automated rule analysis, change workflow management, and compliance reporting. Illumio's micro-segmentation platform approaches it from the enforcement layer, applying granular policy controls workload-to-workload, whether on-premises or in the cloud, without requiring network reconfiguration.
Together, they represent a maturity arc that Stiennon describes as increasingly urgent. As organisations migrate workloads to cloud environments, adopt containerisation, and expand their attack surface through remote work and third-party integrations, the traditional approach to policy management has been reactive, manual, and siloed by device, which is simply incompatible with operational reality.
Want to learn more about cybersecurity strategies? Visit firemon.com
The 2017 State of the Firewall
FireMon’s 3rd Annual State of the Firewall Report is based on 437 survey responses collected between November 16, 2016, and December 6, 2016. Survey p
Takeaways
- The evolution of cybersecurity policy and its impact on security architecture.
- The origins and importance of policy management in firewalls.
- Challenges of managing complex policies in large enterprises.
- The concept of zero trust and its relation to policy flaws.
- The role of micro-segmentation and graph databases in modern security.
Comments ( 0 )