February 15, 2021 By David Bisson 2 min read

This is the first in a series of three blog posts about network segmentation. 

Many businesses are looking to augment their defenses by changing their approach to network security. Take the heightened awareness around building zero trust networks, for instance. Embracing the shift to zero trust will require users to address the threat of lateral movement. One of the ways they can do this is by segmenting the network according to their security needs. But this raises an important question: how does one segment a network well?

To answer that question, I’ll look at the principle of network segmentation over the span of three blog posts. Let’s start off slow. How do you define network segmentation? What benefits can you reap by segmenting the network?

What is Network Segmentation?

Network segmentation is the process of breaking a network into smaller networks. Firewalls, for example, can prevent traffic that began in one part of the network from reaching another segment. Admins could also choose to enforce this based upon the type, source or destination of specific traffic.

In whatever way it’s put in place, network segmentation aims to respond to the weaknesses of a ‘flat’ network model, where everything is trusted. The danger with such a network model is that malicious actors could gain access to sensitive data by capitalizing on a single network intrusion and moving sideways. Segmentation addresses that threat by limiting access to sensitive systems, hosts and data.

What Are the Benefits of Network Segmentation?

Network segmentation can help prevent, spot and respond to potential threats. One main benefit is in the way it brings improved access controls for both internal and external network defenses. It can also prevent external actors from finding a foothold in the network, as well as blocking attackers who are already in the network from moving laterally. That’s why network segmentation is so important when splitting what’s trusted from what’s untrusted in a zero trust network.

Network segmentation can also help detect potential intrusions with custom network monitoring tools. If a security expert watching out for a critical section spots anything weird, they only have to check one segment instead of an entire flat network. This could limit the scope of a ransomware attack, for instance. It also makes it safer to deploy Internet of things (IoT) devices that might lack security by design in a way that doesn’t put the rest of the network at risk.

The benefits aren’t just in the security realm, either. When done correctly, admins can shape traffic in such a way that reduces network congestion and thereby improve performance. They can also use network segments to partition the attack surface and/or their existing risks in a way that makes it easier for them to fulfill their compliance goals. For instance, medical organizations could separate protected health information on one segment and concentrate their compliance efforts there instead of throughout the entire network.

Not Always a Smooth Ride

Clearly, organizations can reap many benefits from network segmentation. But doing so isn’t always easy. I’ll discuss some challenges that you could face along the way in the next post in this series.

More from Network

Databases beware: Abusing Microsoft SQL Server with SQLRecon

20 min read - Over the course of my career, I’ve had the privileged opportunity to peek behind the veil of some of the largest organizations in the world. In my experience, most industry verticals rely on enterprise Windows networks. In fact, I can count on one hand the number of times I have seen a decentralized zero-trust network, enterprise Linux, macOS network, or Active Directory alternative (FreeIPA). As I navigate my way through these large and often complex enterprise networks, it is common…

Easy configuration fixes can protect your server from attack

4 min read - In March 2023, data on more than 56,000 people — including Social Security numbers and other personal information — was stolen in the D.C. Health Benefit Exchange Authority breach. The online health insurance marketplace hack exposed the personal details of Congress members, their families, staff and tens of thousands of other Washington-area residents. It appears the D.C. breach was due to “human error”, according to a recent report. Apparently, a computer server was misconfigured to allow access to data without proper…

X-Force identifies vulnerability in IoT platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

Cybersecurity in the next-generation space age, pt. 4: New space future development and challenges

4 min read - View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this series, we ascertain that the technological evolution of New Space ventures expanded the threats that targeted the space system components. These threats could be countered by various cybersecurity measures. However, the New Space has brought about a significant shift in the industry. This wave of innovation is reshaping the future…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today