官术网_书友最值得收藏!

Network segmentation

Most of us focus on front door security and threats coming from the outside world by putting some sort of firewall on the perimeter. In reality, relying upon perimeter security alone does not protect your network and information data. Doing this is like putting money into a bank which depends on one armed guard.

The concept of segmentation is based on ancient history, when Roman empires formed and fought units based on the ethnic and geographic identity of captured warriors. The idea was very simple: groups of warriors were formed on the basis of their similar backgrounds so that they could bond with each other and ultimately become better fighting units.

Resource consolidation, virtualization and network consolidation can be beneficial when focusing on infrastructure security. The consolidation of network infrastructure with improved security has been a crucial part of the segmentation strategy. A legacy model of distributed applications and services with complex designs are now migrating to shared physical infrastructure or cloud networks that require separation to maintain strong isolation. Similarly, networks have gone through abrupt changes over the past few years with the introduction of virtualization, Software Defined Network (SDN), containers, wireless connectivity, hosting services, Data Center infrastructure and the Internet of Things (IoT). Network separation can be achieved by implementing Layer-2 technologies such as VLANs, Layer-3 technologies such as virtual routing and forwarding (VRF) for routing separation, and zone based firewalls for segment separation.

In today's cyber security environment, you have to assume that you are not 100% immune to these threats and something malicious might already be on a network. Using a multi-layer approach, network segmentation makes it more difficult for an attacker to launch an attack throughout your entire network. It also adds an additional layer of deterrent for insiders because you can isolate valuable data and resources from insider attacks.

From a network design point of view, networks with limited segmentation, a high number of users and various applications typically experience access control issues. Every user group has access to pretty much every application in the enterprise network. All departments can connect to all other resources on a network, as shown in the following diagram:

主站蜘蛛池模板: 葫芦岛市| 炎陵县| 呼和浩特市| 博客| 葵青区| 德庆县| 凌海市| 昂仁县| 宁都县| 盐山县| 鲁山县| 和硕县| 广丰县| 图片| 左权县| 沈丘县| 天柱县| 塔河县| 娄底市| 镇雄县| 赣州市| 长沙县| 陆河县| 昭觉县| 南华县| 磴口县| 齐齐哈尔市| 上栗县| 乐业县| 兴业县| 安乡县| 吴川市| 大悟县| 如东县| 乳源| 朝阳县| 永定县| 辉南县| 呼图壁县| 团风县| 昌都县|