Microsegmentation (network Security)
   HOME

TheInfoList



OR:

Microsegmentation is a
network security Network security consists of the policies, policies, processes and practices adopted to prevent, detect and monitor unauthorized access, Abuse, misuse, modification, or denial of a computer network and network-accessible resources. Network securi ...
approach that enables security architects to construct network security zones boundaries per machine in
data center A data center (American English) or data centre (British English)See spelling differences. is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommunic ...
s and cloud deployments in order to segregate and secure workloads independently. It is now also used on the client network as well as the data center network.


Types of microsegmentation

There are three main types of microsegmentation: * Native OS host-based firewall segmentation employs OS firewalls to regulate network traffic between network segments. Instead of using a router or network firewalls or deploying agents, each host firewall is used to perform both auditing and enforcement, preventing attackers from moving laterally between network machines. While Native OS host-based firewalls can implement many segmentation schemes, including microsegmentation, only recent innovations in the space have made implementation and management achievable at scale. * Host-agent segmentation: This style of microsegmentation makes use of endpoint-based agents. By having a centralized manager with access to all data flows, the difficulty of detecting obscure protocols or
encrypted communication Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
s is mitigated. The use of host-agent technology is commonly acknowledged as a powerful method of microsegmentation. Because infected devices act as hosts, a solid host strategy can prevent issues from manifesting in the first place. This software, however, must be installed on every host. * Hypervisor segmentation: In this implementation of microsegmentation, all traffic passes through a
hypervisor A hypervisor (also known as a virtual machine monitor, VMM, or virtualizer) is a type of computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is calle ...
. Since hypervisor-level traffic monitoring is possible, existing
firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...
s can be used, and rules can be migrated to new hypervisors as instances are spun up and spun down. Hypervisor segmentation typically doesn't function with cloud environments, containers, or bare metal, which is a downside. * Network segmentation: This approach builds on the current setup by using tried-and-true techniques like
access-control list In computer security, an access-control list (ACL) is a list of permissions associated with a system resource (object). An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on give ...
(ACLs) for network segmentation.


Benefits

Microsegmentation allows defenders to thwart almost any attack methods by closing off attack vectors within internal networks so that the attackers are stopped in their tracks. Microsegmentation in
internet of things The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other comm ...
(IoT) environments can help businesses gain command over the increasing volume of
lateral communication Lateral communication is "the exchange, imparting or sharing of information, ideas or feelings between people within a community, peer groups, departments or units of an organization who are at or about the same hierarchical level as each other fo ...
taking place between devices, which is currently unmanaged by perimeter-focused security measures.


Challenges

Despite its useful features, implementing and maintaining microsegmentation can be difficult. The first deployment is always the most challenging. Some applications may not be able to support microsegmentation, and the process of implementing microsegmentation may cause other problems. Defining policies that meet the requirements of every internal system is another potential roadblock. Internal conflicts may occur as policies and their ramifications are considered and defined, making this a difficult and time-consuming process for certain adopters. Network connection between high and low-sensitivity assets inside the same security boundary requires knowledge of which ports and protocols must be open and in which direction. Inadvertent network disruptions are a risk of sloppy implementation. Microsegmentation is widely compatible with environments running common operating systems including
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
,
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
, and
MacOS macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
. However, this is not the case for companies that rely on
mainframe A mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk data processing for tasks such as censuses, industry and consumer statistics, enterprise ...
s or other outdated forms of technology. To reap the benefits of microsegmentation despite its challenges, companies have developed solutions by using automation and self service.


Service providers

* Cisco * Palo Alto Networks * VMware * Zero Networks * Zscaler


References

{{reflist Computer network security