When a cyber-criminal gains unauthorized access to a network, segmentation or “zoning” can provide effective controls to limit further movement across the network.3 PCI-DSS (Payment Card Industry Data Security Standard), and similar standards, provide guidance on creating clear separation of data within the network, for example separating the network for Payment Card authorizations from those for Point-of-Service (till) or customer Wi-Fi traffic. A sound security policy entails segmenting the network into multiple zones, with varying security requirements, and rigorously enforcing the policy on what is allowed to move from zone to zone.4
Finance and Human Resources typically need access via their own VLAN to their application servers because of the confidential nature of the information they process and store. Other groups of personnel may require their own segregated networks, such as server administrators, security administration, managers and executives.5
Third parties are usually required to have their own segments, with different administration passwords to the main network, to avoid attacks via a compromised, less well protected, third party site.67
Segregation is typically achieved by a combination of firewalls and VLANs (virtual local area networks). Software-defined networking (SDN) can allow the creation and management of micro-segmented networks.
Carter, Kim (2019). "Network: Identify Risks". Holistic Info-Sec for Web Developers. Leanpub. Retrieved April 11, 2019. https://f1.holisticinfosecforwebdevelopers.com/chap04.html#network-identify-risks-lack-of-segmentation ↩
Carter, Kim (2019). "Network: Lack of Segmentation". Holistic Info-Sec for Web Developers. Leanpub. Retrieved April 11, 2019. https://f1.holisticinfosecforwebdevelopers.com/chap04.html#network-countermeasures-lack-of-segmentation ↩
Reichenberg, Nimmy (March 20, 2014). "Improving Security via Proper Network Segmentation". Security Week. http://www.securityweek.com/improving-security-proper-network-segmentation ↩
Barker, Ian (August 21, 2017). "How network segmentation can help contain cyber attacks". betanews.com. Retrieved April 11, 2019. https://betanews.com/2017/08/21/network-segmentation-contain-attacks/ ↩
Reichenberg, Nimmy; Wolfgang, Mark (24 November 2014). "Segmenting for security: Five steps to protect your network". Network World. Retrieved April 11, 2019. http://www.networkworld.com/article/2851677/security0/segmenting-for-security-five-steps-to-protect-your-network.html ↩
Krebs, Brian (February 5, 2014). "Target Hackers Broke in Via HVAC Company". KrebsonSecurity.com. http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/ ↩
Fazio, Ross E. "Statement on Target data breach" (PDF). faziomechanical.com. Fazio Mechanical Services. Archived from the original (PDF) on February 28, 2014. Retrieved April 11, 2019. https://web.archive.org/web/20140228214212/http://faziomechanical.com/Target-Breach-Statement.pdf ↩