network segmentation (original) (raw)

What is network segmentation?

Network segmentation is a networking architectural design that divides a network into multiple segments (subnets) with each functioning as a smaller, individual network. Segmentation works by controlling the flow of traffic within the network. Traffic can be restricted in or to segments based on location, along with where traffic can and cannot flow. Traffic flow can also be limited by traffic type, source and destination.

The reasons for using network segmentation include the following:

Network segmentation should not be confused with microsegmentation, which reduces an organization's network attack surface by applying specific security controls to limit east-west communication at the workload level. While microsegmentation has its applications, it should not be confused with regular network segmentation. There are many differences between the two, including the following:

Microsegmentation

Microsegmentation enables software-based granular control of devices and virtual networks.

How does network segmentation work?

Network segmentation divides a network into multiple zones and manages each zone, or segment, individually. This means applying traffic protocols to manage what traffic passes through the segment and what is not allowed. It also covers security protocols to each zone to manage security and compliance.

Network segments are designated with their own dedicated hardware to wall each other off and only allow credentialed users to access the system. Rules are built into network configurations to determine how users, services and devices on subnetworks can interconnect with each other.

Types of network segmentation

There are two types of network segmentation: physical and virtual.

Physical segmentation uses dedicated hardware to build segments. While physical segmentation is the most secure method, it is also the most difficult to manage. Also known as perimeter-based segmentation, each segment needs its own internet connection, physical wiring and firewall. This type of segmentation operates on trust, in which anything internal is trusted and anything external is not. There are few restrictions on internal resources, which commonly operate over a flat network with minimal internal network segmentation.

Physical segmentation is also highly insecure. Once hackers or malicious actors have penetrated the firewall, they are free to move around within the network with little to nothing to stop them.

The yes/no trust of perimeter-based segmentation is no longer viable with the explosion in endpoints, all with varying levels of trust. As a result, network virtualization has become increasingly popular. It is easier to implement, as well as lock down and wall off areas from intrusion.

Virtual network segmentation covers the entire network, not just at the perimeter. Switches manage the virtual local area network environment, and firewalls are shared, reducing the required hardware. Perimeter-based segmentation is now virtualized and distributed, and security policies are much more specific and fine-grained.

What are the benefits of network segmentation?

Overall, network segmentation's major benefit is in the area of security, with manageability and performance also a consideration. Network segmentation by virtualization increases security in several ways, including the following:

Examples of network segmentation use cases

The security and performance benefits of network segmentation can be applied to multiple situations, including the following:

How to implement network segmentation

Segmenting a network is no trivial task. It requires a great deal of planning and preparation, as well as ongoing maintenance. Therefore, network teams need proper time to plan and design, starting with the following steps:

  1. Perform an inventory. Many companies don't have a proper inventory of their IT systems, including sensitive data and where it lives. Network administrators should ask what systems the company has and who has access to them.
  2. Identify who needs to use the data. This helps implement a rules-based system by granting access to only those who need it.
  3. Look at the what monopolizes bandwidth. One app might consume 50% of network capacity. If so, administrators should put that app on its own subnet to avoid slowing down everyone else.
  4. Design a segmented network. Segments can be designed after discovering which users need access to specific data and systems.
  5. Start with the smallest and easiest segments. Administrators can practice and learn on segments with less complexity or dependencies.
  6. Default deny rule. Following this basis of firewall configuration, deny access to everything that hasn't been explicitly allowed.
  7. Review changes frequently. Ensure that changes do not violate the segmentation configuration.
  8. Monitor closely. Pay attention to anything from bad-behaving apps to unusual network traffic. Administrators should review logs every day and analyze them for suspicious or unusual behavior.

This was last updated in March 2022

Continue Reading About network segmentation

Dig Deeper on Network security