How Well Do You Know Your IT Environment?

August 3, 2018

How Well Do You Know Your IT Environment?

Do you know what’s in your data center? How about your wide area network (WAN)? If you had to draw a map or produce a list of all the things that are connected to your systems in the next week, could you? It sounds like the simplest of things to have, but more often than not, most people have no idea what’s really going on in their IT organization.

Years ago our VAR took on a new client. This client was in the medical field and had a really good idea of the technology in their organization. They knew everything that supported their mission to provide value to their customers. However, the senior engineer from our company that was supporting the client wanted to map the entire infrastructure before we took them on. The client told him that it wasn’t necessary. He insisted. He spent weeks mapping out every connection. He looked at every device and traced every cable. He produced a beautiful Visio drawing that ended up hanging in their office for years like a work of art.

What did our senior engineer find out? Well, as it turns out, one big thing he found was a redundant wireless bridge on the roof that was used in the past to connect to a building across the street. When he first discovered it, no one knew what it was supposed to do. It took a few days of questions before he found someone that even remembered the time when the company rented space from the ancillary building and wanted it connected. When we brought up the old equipment to the client’s IT team, you can imagine the quizzical looks on people’s faces. Well, except for the security team. They were more worried than curious.

Why is it so hard to keep track of things? How is it that rogue equipment can appear in our organization before we realize what’s going on? In part, it’s because of the mentality that we’ve had for so long that things need to “just work.” Instead of creating port security profiles and alerting people when someone plugs a device into the network, we instead choose to enable everything in case someone moves a computer or needs an additional drop activated. Instead of treating our user space as a hostile environment, we open it up in the hopes that our users don’t call us for little things that need to be dealt with. This leads to us finding all kinds of fun things plugged into the network causing havoc by the end of the day.

Likewise, we also don’t have a good plan for adding equipment behind the scenes. How many times has a vendor offered a proof-of-concept (PoC) trial of equipment and plugged it directly into the network? I’m sure that some of you out there with an Infosec background are probably turning colors right now, but I’ve seen it more times than I care to count. Rather than taking the time to test equipment with good testing data, the vendor would rather test the equipment against live workloads and push traffic through a PoC to show everyone what it really looks like or how easy their equipment really is to work with.

If you don’t know what you’re working with in your IT environment, you might as well be trying to work with a blindfold on. You may have switches running as the root of a spanning tree that are from the last century. You may have older virtualized hosts that aren’t getting patched any more. You may even find that someone has installed nefarious hardware or software to collect data without your knowledge. And all of that pales in comparison to what might happen if you work in a regulated environment and find out someone has been quietly exfiltrating data around a firewall because you don’t have proper controls in place to prevent it.

How well do you know your IT organization? Do you know it well enough to point out every blinking light? If you had to disappear tomorrow, would your co-workers know it as well as you? Do you document like your replacement will come looking for you when things go wrong?

Tom Hollingsworth, CCIE #29213, is a 15-year veteran of the networking industry. He spent over a decade as a senior network engineer for an education-focused reseller, specializing in the implementation and operation of advanced technologies. Tom is well versed in the mechanics of campus and data center networks, voice and collaboration systems, and data center virtualization. Tom has also been a vocal member of the networking community. He is active on Twitter as @NetworkingNerd, and writes on his blog at, as well as being a columnist for Network Computing. He has been a speaker and panel moderator for TechUnplugged and Interop, in addition to serving as the Interop Networking Track Chair and Infrastructure Advisory Board member. Tom has been a regular guest on industry podcasts, including Packet Pushers and Current Status. Tom is currently serving as an organizer on the Tech Field Day event series, specializing in networking and mobility technologies. He speaks daily with companies on the forefront of exciting new ideas and incredible new solutions, and works with industry influencers to help the greater networking community understand how they work and how networking professionals can take advantage of them in everyday practice.