/overlaid

Leveraging SD-WAN for Mergers & Acquisitions

A colleague recently asked me if SD-WAN could be leveraged to expedite network integration as a result of a merger or acquisition. His thoughts were that this could potentially provide a means to securely integration networks in a short amount of time.  At first I thought this made no sense — SD-WAN is not related to this challenge whatsoever. However, the idea stuck in my head like a bad catchy tune. I started thinking… maybe in certain circumstances this could work?  This post is a collection of some ideas I’ve been brewing with respect to the secure and timely integration of disparate networks using over-the-counter SD-WAN.

Mergers & Acquisitions

Whether entities are merging, separating, being acquired, or simply expanding to Greenfield locations — it’s the application and business requirements that are the most critical components driving design and implementation strategies.  Mergers and acquisitions are one of the most challenging types of integrations. Here we’ll be looking at just a single portion of the M&A – network integration. 

Information gathering is first task to accomplish when approaching a network merger.  Some common questions and requests include:

General Request for Information

Connectivity

Routing

Segmentation

Platform

Security

Voice

Tools & Monitoring

Operations

M&A Specific Questions

Mergers & Acquisitions – Safety first

Security advisors from each entity will naturally distrust the procedures and protocols in place at the opposing entity.  This is not due to disrespect, it’s organically rooted in a Zero Trust ideology prevalent in the minds of security-centric individuals. Each component of a network will be under scrutiny. It is the responsibility of the advisory teams to cooperate and negotiate on go-forward strategies with respect to each security layer within the business model. If this is an acquisition – it’s not uncommon for the acquiring entity to dictate security policies and architecture. If this is a merger, there are typically two solutions when addressing disparities in the alignment of security policies and architecture:

  1. Consolidate onto the more thorough policy with respect to the security layer in question
  2. Develop a new policy or architecture alignment that meets the requirements for each entity

Connecting entities

Once it has been decided to connect disparate entity networks, decisions must be made to determine how.  Ideally, networks are connected via high speed enterprise-grade circuits. The cost benefit for organizations to quickly integrate and consolidate often challenges this approach due to the significant delay with provisioning. 

 

Because of this, network mergers often start with IPSec VPN between the two entities. Not only does it can take several months to get enterprise-grade circuits provisioned to connect the two entities at proper locations, leading to significant delays in integration, but VPN is also initially preferred due to minimal impact from a routing and security perspective. VPN is by no means a long-term solution. However, VPN can be relatively simple to instantiate with minimal impact to current architecture.  VPN devices typically support NAT.  This is important because IP Addressing overlap will likely exist between merging networks.  NAT at either end will guarantee that the IP addresses map to some other non-overlapping IP space.  From a routing perspective, merging entities can decide whether they desire to statically route networks over the crypto domain, or exchange routes dynamically with a routing protocol such as OSPF, EIGRP or BGP.  Each option comes with its own challenges and benefits and will depend on the environment capabilities.

Important to keep in mind, VPN will typically utilize the pre-existing circuits, creating a tunnel that now competes with production Internet traffic between entities.  This raises a new series of questions. How much bandwidth is available?  Can egress traffic be prioritized to prevent congestion? How does this impact SLAs?

From a security perspective, terminating VPN tunnels behind a DMZ will allow for greater control and visibility of the communications traversing the path.  Firewalls, intrusion prevention systems, anti-malware systems, and security packet brokers can be leveraged on each side of the tunnels before permitting traffic to enter the LAN. Ideally, a centralized SIEM will monitor all devices and flows between these network paths. However, too often are networks merged and firewall policies relaxed because both sides are under pressure to expedite whilst neither side fully understands what is actually needed. This blind trust leads to poor design, undocumented band-aids, and unnecessarily privileged access. Certain vulnerabilities may be detected between networks, but who is to say that user X should be capable of accessing application Y?

SD-WAN – An Alternative Approach

Some of these challenges can be overcome with the advent of technologies such as SD-WAN.  First, instead of waiting for costly and arduous enterprise circuits to be provisioned, and instead of tunneling VPN traffic over pre-existing Internet circuits, consider the alternative of rapidly procuring fast commodity Internet circuits at each site. These types of circuits can be turned up in days, provide high speed connectivity and are extraordinarily low cost. Moreover, you can bundle multiple circuits at each site, increasing available bandwidth and intelligently routing particular traffic over particular paths.

Other benefits include integrated security, deep application visibility, and policy centralization.  Rather than excessively permitting access by blinding opening firewall rules, a better approach is to centralize intelligence and start profiling communication over the links to appropriately build least-privilege access policies.

Seizing Opportunity – Internet Edge Post-M&A

Each entity being merged will have a number of Internet egress points.  This could be anywhere from a small handful to tens of thousands.  Determining routing requirements such as public IP space and BGP consolidation is critical, however, protecting the public edge is of the utmost importance. Sometimes it is decided to utilize the mature security strategy of a single entity and replace or consume the edge security operations under a retrofitted architecture.  Herein lies significant challenges with integrating, managing, and monitoring multiple security solutions at multiple entities. Companies have a tough enough time as it is maintaining their current setup of security applications at all of their locations.  Such applications include unified threat management, firewalls, IPS, AV, Proxy or URL filtering, access control, and data protection.

 

Let’s consider a potentially better and more modern approach by adopting a new security architecture that covers all merged entities. The logic behind this is twofold.  First, the new security architecture will serve as neutral grounds for a consolidated security team.  Second, a new security architecture provides the opportunity to scale security, increase visibility, and centralize control. It’s likely the entities are utilizing cloud applications or some flavor of XaaS. Now is a prime opportunity to adopt a new architecture that encompasses Cloud Web Security, Cloud Access Security Brokers, and Software-defined Security.  Putting this all together with SD-WAN between the entities and we’re starting to see the picture. 

My closing thoughts

Will SD-WAN be the answer for all M&As?  Definitely no.  Where do I see this potentially being leveraged?  I see potential for small-to-medium network integrations, especially if time is a concern.  My logic behind this is simple – no waiting for circuits, no reliance on existing Internet circuits, and granular uniformity of security policies while applications and users get on-ramped. On the other hand, maybe it’s ludicrous and overly complicated to consider SD-WAN, whether interim or permanent.  Keep thinking long-term and how integrations can be advantageous for developing new designs and strategies – cloud, DIA, and so on.  Agree or disagree?  Feel free to drop thoughts in the comments. At minimum, it’s a good exercise to think about the challenges of integrating networks. I hope your brain was firing while reading through the post.

 

Exit mobile version