Access policies

Access policies enforce rules that control how Workload groups, Network groups, Domain groups, and Endpoint groups communicate. In Xshield, a set of groups that are protected are 'Destination' groups, and the groups that access the protected groups are the 'Source' groups.

An Access policy is a set of inbound and outbound Access parameters enforced on the assets in the Source and Destination groups. In Xshield, an Access parameter is a named combination of port/port range and the protocol used on them. Ports and protocols that are not part of an Access policy are blocked on the assets in the Source and Destination groups.

In Xshield, Access policies can be enforced for the following combinations of Source groups and Destination groups.

Source
Destination Purpose
Domain groups Workload groups
Enable continued software update and patch management for workloads
Network groups

Workload groups

Enable access to infrastructure services
Workload groups Endpoint groups, Network groups, Workload groups
Enable access to Workload groups and for intra-workload group communication

Types of Access policies

Two kinds of Access policies exist in Xshield:

  • System-generated - these are Access policies that Xshield automatically creates when you enforce Corporate policy templates and Security policy templates to Workload groups.

    System-generated Access policies cannot be edited or deleted. They change when you edit the related Corporate policy template or Security policy template or apply policy recommendations to Workload groups. They are not seen when you stop enforcing Corporate policy templates or Security policy templates.

  • User-created - these are Access policies you create to enforce access rules between groups.


Create Access policy

Create multiple Access policies between different source and destination groups to protect critical groups in your network.

When a Workload group is used in an Access policy, you can assign the Access policy to all roles or a specific role (Web, App, or DB) in the Workload group. For example, with an Endpoint group as the Source, you can allow access only to the assets with the Web role in the Destination Workload group.

  1. Go to Policies > Access Policies.

  2. Click Create > Access policy.

  3. In the Source area, select the type of Source group, click Add and add the Source groups.

  4. In the Destination area, select the type of Destination group, click Add and add the Destination groups.

  5. For a Workload group, assets of all roles (Role = ALL) are selected for the Access policy.

    You can select assets of specific roles in the Workload group.

    Click the ALL drop-down list located at the right and select the role/s of assets and click Apply.

  6. In the Access Parameters area, click Add and select the required Access parameters.

    To search for and add specific Access parameters, use the Search box.

  7. In the Port/Protocol area, click Add and add the required combinations of ports and protocols.

  8. Click Save.


Enforce Access policies

  • If the Workload group associated with an Access policy is in the Enforced or Encrypted mode, the new Access policy is automatically enforced.

  • If the Workload group associated with an Access policy is in the Observed mode, the new Access policy is enforced only after the Workload group is moved to the Enforced mode.

When policies are successfully enforced on the assets in the Source and Destination groups assets, the related inbound and outbound Access parameters are added to the assets' native firewall.


Filter Access policies

When you create many Access policies, it may be hard to find Access policies you want to review or edit. 

To filter the Access Policies page, search by the name of the Source group (Source group column) or Destination group (Destination group column).


Next steps

  • Enforce Access policies on the Workload groups to protect the Workloads.

  • Verify if the policies are pushed to the assets.

  • Investigate traffic flows between Source groups and Destination groups. See Investigate traffic flows for more details.

  • Monitor policy violation alerts related to Access policies between Source groups and Destination groups. Read Investigate alerts for more.

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.