Network segmentation

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Network segmentation in computer networking is the act or practice of splitting a computer network into subnetworks, each being a network segment. Advantages of such splitting are primarily for boosting performance and improving security.

Advantages[edit]

  • Reduced congestion: Improved performance is achieved, because on a segmented network there are fewer hosts per subnetwork, thus minimizing local traffic
  • Improved security:
    • Broadcasts will be contained to local network. Internal network structure will not be visible from outside.
    • There is a reduced attack surface available to pivot in if one of the hosts on the network segment is compromised. Common attack vectors such as LLMNR and NetBios poisoning can be partially alleviated by proper network segmentation as they only work on the local network. For this reason it is recommended to segment the various areas of a network by usage. A basic example would be to split up web servers, databases servers and standard user machines each into their own segment.
    • By creating network segments containing only the resources specific to the consumers that you authorise access to, you are creating an environment of least privilege[1][2]
  • Containing network problems: Limiting the effect of local failures on other parts of network
  • Controlling visitor access: Visitor access to the network can be controlled by implementing VLANs to segregate the network

Improved Security[edit]

When a cyber-criminal gains unauthorized access to a network, segmentation or “zoning” can provide effective controls to limit further movement across the network.[3] PCI-DSS (Payment Card Industry Data Security Standard), and similar standards, provide guidance on creating clear separation of data within the network, for example separating the network for Payment Card authorizations from those for Point-of-Service (till) or customer wi-fi traffic. A sound security policy entails segmenting the network into multiple zones, with varying security requirements, and rigorously enforcing the policy on what is allowed to move from zone to zone.[4]

Controlling Visitor Access[edit]

Finance and Human Resources typically need access via their own VLAN to their application servers because of the confidential nature of the information they process and store. Other groups of personnel may require their own segregated networks, such as server administrators, security administration, managers and executives.[5]

Third Parties are usually required to have their own segments, with different administration passwords to the main network, to avoid attacks via a compromised, less well protected, third party site.[6][7]

Means of Segregation[edit]

Segregation is typically achieved by a combination of firewalls and VLANs (Virtual Local Area Networks). Software-Defined Networking (SDN) can allow the creation and management of micro-segmented networks.

See also[edit]

References[edit]

  1. ^ https://f1.holisticinfosecforwebdevelopers.com/chap04.html#network-identify-risks-lack-of-segmentation
  2. ^ https://f1.holisticinfosecforwebdevelopers.com/chap04.html#network-countermeasures-lack-of-segmentation
  3. ^ Improving Security via Proper Network Segmentation", Nimmy Reichenberg, March 20, 2014, Security Week, http://www.securityweek.com/improving-security-proper-network-segmentation
  4. ^ "How network segmentation can help contain cyber attacks". betanews. 2017.
  5. ^ "Segmenting for security: Five steps to protect your network", Network World, 24 November 2014, http://www.networkworld.com/article/2851677/security0/segmenting-for-security-five-steps-to-protect-your-network.html
  6. ^ "Target Hackers Broke in Via HVAC Company", Krebs on Security, 05 February 2014, http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/
  7. ^ "Target Breach Statement", Fazio Mechanical Services, http://faziomechanical.com/Target-Breach-Statement.pdf