CISSP · · 4 min read

Network Security Operations and Change Management: Keeping the Lights On Without Opening Holes

Most security gaps are created by rushed changes, not attackers. Learn how to run network operations and changes without quietly undermining your controls.

Hook / Why this matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Most security holes are not created by attackers. They are created by rushed changes, emergency workarounds, and undocumented exceptions. Network operations and security must work together if you want controls that survive real life.

Core concept explained simply

Network security operations is about running and changing the network in ways that preserve security goals. Change management provides guardrails so that routine work on firewalls, routers, VPNs, and other components does not quietly erode your security posture.

Change management for network security controls

Every change to firewalls, VPNs, routing, and access lists can affect trust boundaries.

Effective change management usually includes:

The goal is not bureaucracy for its own sake, but traceable decisions and predictable outcomes.

Exceptions and temporary rules

Over time, exceptions accumulate:

Without a process to track and review exceptions, they become permanent anonymous risks.

Good practice includes:

Standard operating procedures

Standard operating procedures (SOPs) document how common tasks should be performed.

Examples include:

SOPs help ensure that each change includes appropriate segmentation, logging, and monitoring by default, rather than relying on individuals to remember every security consideration.

Coordination between teams

Network operations, security, application, and cloud teams all influence communication paths.

Effective collaboration means:

Without coordination, teams may implement inconsistent controls or bypass safeguards under pressure.

Configuration baselines and drift detection

Configuration baselines define what "good" looks like.

Drift detection compares running configurations to baselines and alerts when differences appear. This helps catch unauthorized changes, mistakes, and gradual erosion of standards.

CISSP lens

For Domain 4, you should understand:

When evaluating options, consider whether they would still be safe after months of routine operations and staff changes.

Real-world scenario

During an outage affecting a critical customer portal, an engineer opened a broad firewall rule permitting "any to any" traffic between the DMZ and internal application network. The change restored service quickly and the incident was declared resolved.

However, the emergency rule was never removed. It lacked a clear owner, justification, or expiration date.

Months later, attackers exploited a vulnerability in a public facing application. Once inside the DMZ, they discovered that they could connect freely to internal application and database servers due to the broad rule. This significantly expanded the impact of the breach.

After the incident, the organization reworked its network change practices:

These changes made the network more resilient to human error and reduced the chance that an emergency fix would become a long term vulnerability.

Common mistakes and misconceptions

Frequent issues include:

A CISSP should aim to embed security into normal operations so that secure behavior is the default, not the exception.

Actionable checklist

To strengthen network security operations and change management:

Key takeaways

Optional exam-style reflection question

Why is it a good practice to configure temporary firewall rules with automatic expiration dates, especially for emergency changes?

Answer: Automatic expiration ensures that temporary access does not become a permanent, forgotten hole. It forces a conscious decision to renew or close the access, reducing the risk of lingering broad permissions created during emergencies or special projects.

Read next

© 2025 Threat On The Wire. All rights reserved.