VLANs, Zero Trust architecture. Micro-segmentation. Air-gap critical assets. Restrict lateral movement.
Network Segmentation divides a network into smaller, isolated segments to contain breaches, reduce attack surface, and enforce least-privilege access. Think of it like watertight compartments on a ship—if one section floods, the others remain secure.
Layer 2 segmentation at switch level
Granular per-workload segmentation
Isolated zone for public-facing services
Identity-based, not network-based access
Network device management (switches, routers). Admin access only. 10.0.10.0/24
Application servers, databases. Isolated from user workstations. 10.0.20.0/24
User workstations. Limited server access via firewall rules. 10.0.30.0/24
Visitor access. Internet only, no internal network access. 10.0.40.0/24
Cameras, printers, smart devices. Isolated from corporate network. 10.0.50.0/24
Public-facing web servers, email gateways. Dual firewall protection. 10.0.99.0/24
Micro-segmentation applies firewall rules at the VM/container level, not just network perimeter. Every workload has its own security policy.
💡 Benefit: Even if attacker compromises web server, they can't talk to database tier (not in policy)
Ransomware gang accessed corporate network via VPN, then pivoted to OT (operational technology) network controlling fuel pipelines.
Design VLANs, configure firewall rules, and test attack scenarios to see how segmentation contains breaches.
Based on segmentation and firewall rules