Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Security Segmentation and Flexibility? Yes, They Can Go Together

In today’s world we expect flexibility without compromising security. We may need a crossover with “stow and go” seats and underfloor storage so we can turn it into a van. But we don’t expect its safety rating to drop when we change the configuration. We may need a work space that can be reconfigured into cubicles, team rooms, quite zones, and work cafes. But we assume worker safety regardless of the configuration.

In today’s world we expect flexibility without compromising security. We may need a crossover with “stow and go” seats and underfloor storage so we can turn it into a van. But we don’t expect its safety rating to drop when we change the configuration. We may need a work space that can be reconfigured into cubicles, team rooms, quite zones, and work cafes. But we assume worker safety regardless of the configuration.

So what happens when we apply a similar mindset to our business? Building new digital processes, moving equipment around, deploying a new application, acquiring another organization, or closing facilities shouldn’t make us more vulnerable to attacks. But it can. Organizations are struggling to identify, contain, and respond resiliently to cyber attacks. At the same time, they need to support increased business innovation and change. Being able to flexibly build new digital processes and adapt to other business changes securely is what we should expect and require for success.

Network SecurityFor many years we’ve relied on network segmentation to isolate different parts of the network, using firewalls and virtual local area networks (VLANs) to mitigate the risk of attacks. But this approach lacks the flexibility to respond to changing business requirements. To overcome this limitation we open up the firewall to allow connections, which decreases the extent of control the firewall was designed to provide and leads to increasingly complex rule sets to manage. As such, many organizations have retreated on segmentation, using it only in a few select areas of their network where required for compliance reasons such as PCI.

To compensate for the lack of flexibility inherent in network segmentation, we need a model that lets us think about segmentation independent of the underlying technology. This requires we step back and take a new, strategic approach to segmentation that begins by asking: what is the ultimate business goal, the digital model to achieve it, and the requirements for protection?  This allows us to think about segmentation more holistically to include data, user, application, and business process considerations.

So how do we go about this? To develop your segmentation strategy you need to look at both your specific business goals and your risk landscape. A framework that considers identity and trust, visibility, policy enforcement, availability, and resiliency will allow you to move beyond the network layer. Let’s look at how this approach plays out in the healthcare industry, a highly regulated sector recently targeted by destructive malware and ransomware, subject to compliance mandates, and grappling with an evolving technology landscape.

Hospitals need to protect clinical data and devices from the general hospital population and patient population that have access to the network. But the environment in which they operate is extremely complex. Equipment moves around; an array of devices are connecting to the network; patients and care givers need network access; electronic medical records must be protected; campuses and regional clinics need to be connected; and new and acquired facilities must be added while other facilities may be closing. You need to start by understanding all the systems on the network that generate data and the various individuals who need to communicate and have access to that data. From there you can assign permission-level access based on hospital policies and compliance mandates. With levels of trust established you can apply policy enforcement, not just in the network but also within systems and applications.

Organizations in other industries need to follow a similar process but key considerations vary by industry. Financial services firms look at their business based on products and environments (branches and data centers) allowing for communication and access to systems and data while at the same time limiting the ability for an attack to move laterally across the institution. Manufacturers and utilities must consider how they isolate their operational technology (OT) networks from the IT networks, balancing availability and reliability with system integrity.  

In each of these examples, defining a strategic approach to segmentation begins by looking at the business in a way that transcends a particularly technology or environment or even process. Business leaders must engage with IT to help define the requirements. And when it comes time to implement segmentation they need to share their understanding of data flows, users, and business processes to make sure technology is applied in a way that makes sense for that business. IT teams can then apply technologies like micro-segmentation, firewalls, virtualization, application visibility, and encryption that work together to provide differentiated controls based on criticality of systems and data and who needs access to what to extend segmentation beyond the network.

Taking a strategic approach to segmentation that adapts to change isn’t as easy as folding away seats to convert your crossover to a van, or even moving around office furniture and partitions to create an impromptu meeting space. But by aligning your segmentation strategy to your business objectives you can be prepared to respond quickly to the needs of the business while reducing risk and protecting data and applications.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet