Work with Policies

ACE automatically gathers policies information related to the security controls in your cloud accounts, subscriptions, and projects. This topic describes how you can review and manage your policies to ensure network security.

Policy details

You can review detailed information on policies detected in your cloud accounts. For more information on policies details based on the security control:

Merge policies

For AWS SG, Azure NSG, and Azure Firewall (classic)

Since each detected network policy is assigned its own individual policies by default, you may want to merge similar policies together to view and manage them together.

Note:

  1. Merging policies is only supported within the same policy type. ACE does not support merging policies across AWS SG, Azure NSG, and Azure Firewall (classic).

  2. For merged policies, risk severity circles are not displayed and the Risks column is greyed out (not active).

Do the following:

  1. View the policies you want to merge, using the search box to search for similar items. For details, see Search Policies.

  2. Expand each policies to inspect its details and confirm that you want to merge them.

  3. Select the check boxes next to each policies you want to merge, and then click Merge.

    Tip: If you have many policies to select, use the Select all or Unselect all links above the grid as needed.

  4. In the Merge Policy dialog box that appears, enter a Name for your new policies , and an optional Description.

    Click Merge to merge the selected policies into a single set.

    The policies grid is updated with your new set. For example:

Tip: To unmerge your merged policies and return each policy to its own individual set, see Work with Policies.

Edit network policy rules

For Azure NSG, Azure Firewall (classic), and AWS SG

Edit each of your network policies by adding, deleting, and modifying rules and rule collections in the network policies .

  • Any changes made in a specific rule affect all security controls where the rule is installed.

  • Only one user can edit each policies at a given time. policies s are locked while editing and are opened in read-only mode by default.

    When you're done, click Commit or Discard changes to unlock the policies for others.

For Azure Firewall (classic) only: Once a rule collection is created, its priority, name, and action are all read only. The rules inside a rule collection, however, can be edited.

Note: If you want to make higher-level changes, such as the policies name, description, or member controls, view the policies from its parent level. For more details, see Work with Policies and Network Policies page.

Do the following:

  1. Browse to and expand a specific network policies . For details, see Network Policies page.

    Rules are displayed in a boxed grid that lists the source, destination, and protocol details for each rule, as well as the security controls each rule is installed on.

    If you are in read-only mode, a large Edit button is shown at the top right of the policies box. Click the Edit button to make changes to the expanded policy.

    Note: For Azure Firewall (classic), the rules are grouped by rule collection. Expand the collection to drill down to rule details.

  2. Do any of the following:
  3. Do one of the following:

    • Click Discard changes to revert back to the last saved version of the policies and unlock it for others.

    • Click Commit at the top of the screen to save your changes.

      ACE displays a list of the changes you made. Accept the changes to complete the commit.

      The commit provisions your changes on the security controls and unlocks the policy for others.

Note: Your changes are automatically saved, even if you haven't committed them, closed your browser or logged out of ACE. They will be there for you the next time you browse back to this policies . However, the policies remains locked for others until you commit or discard your changes.