- Many legacy networks were built for full connectivity and overlooked potential security ramifications.
- Malware, ransomware, and bad actors are proliferating. It is not a matter of if you will be compromised but how can the damage be minimized.
- Cyber insurance will detective control, not a preventative one. Prerequisite audits will look for appropriate segmentation.
Our Advice
Critical Insight
- Lateral movement amplifies damage. Contain movement within the network through segmentation.
- Good segmentation is a balance between security and manageability. If solutions are too complex, they won’t be updated or maintained.
- Network services and users change over time, so must your segmentation strategy. Networks are not static; your segmentation must maintain pace.
Impact and Result
- Create a common understanding of what is to be built, for whom, and why.
- Define what services will be offered and how they will be governed.
- Understand which assets that you already have can jump start the project.
Network Segmentation
Protect your network by controlling the conversations within it.
Executive Summary
Info-Tech Insight
Lateral movement amplifies damage |
From a security perspective, bad actors often use the tactic of “land and expand.” Once a network is breached, if east/west or lateral movement is not restricted, an attacker can spread quickly within a network from a small compromise. |
---|---|
Good segmentation is a balance between security and manageability |
The ease of management in a network is usually inversely proportional to the amount of segmentation in that network. Highly segmented networks have a lot of potential complications and management overhead. In practice, this often leads to administrators being confused or implementing shortcuts that circumvent the very security that was intended with the segmentation in the first place. |
Network services and users change over time, so must your segmentation strategy |
Network segmentation projects should not be viewed as singular or “one and done.” Services and users on a network are constantly evolving; the network segmentation strategy must adapt with these changes. Be sure to monitor and audit segmentation deployments and change or update them as required to maintain a proper risk posture. |
Executive Summary
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
---|---|---|
Networks are meant to facilitate communication, and when devices on a network cannot communicate, it is generally seen as an issue. The simplest answer to this is to design flat, permissive networks. With the proliferation of malware, ransomware, and advanced persistent threats (ATPs) a flat or permissive network is an invitation for bad actors to deliver more damage at an increased pace. Cyber insurance may be viewed as a simpler mitigation than network reconfiguration or redesign, but this is not a preventative solution, and the audits done before policies are issued will flag flat networks as a concern. |
Network segmentation is not a “bolt on” fix. To properly implement a minimum viable product for segmentation you must, at a minimum:
Implementing appropriate segmentation often involves elements of (if not a full) network redesign. |
To ensure the best results in a timely fashion, Info-Tech recommends a methodology that consists of:
|
Info-Tech Insight
The aim of networking is communication, but unfettered communication can be a liability. Appropriate segmentation in networks, blocking communications where they are not required or desired, restricts lateral movement within the network, allowing for better risk mitigation and management.
Network segmentation
Compartmentalization of risk: Segmentation is the practice of compartmentalizing network traffic for the purposes of mitigating or reducing risk. Segmentation methodologies can generally be grouped into three broad categories: 1. Physical Segmentation The most common implementation of physical segmentation is to build parallel networks with separate hardware for each network segment. This is sometimes referred to as “air gapping.” 2. Static Virtual Segmentation Static virtual segmentation is the configuration practice of using technologies such as virtual LANs (VLANs) to assign ports or connections statically to a network segment. 3. Dynamic Virtual Segmentation Dynamic virtual segmentation assigns a connection to a network segment based on the device or user of the connection. This can be done through such means as software defined networking (SDN), 802.1x, or traffic inspection and profiling. |
Common triggers for network segmentation projects 1. Remediate Audit Findings Many security audits (potentially required for or affecting premiums of cyber insurance) will highlight the potential issues of non-segmented networks. 2. Protect Vulnerable Technology Assets Whether separating IT and OT or segmenting off IoT/IIoT devices, keeping vulnerable assets separated from potential attack vectors is good practice. 3. Minimize Potential for Lateral Movement Any organization that has experienced a cyber attack will realize the value in segmenting the network to slow a bad actor’s movement through technology assets. |