Ebook - The Definitive Guide To Micro-Segmentation
Ebook - The Definitive Guide To Micro-Segmentation
to Micro-Segmentation
By John Friedman
About the Author
Jon Friedman is a Managing Consultant at CyberEdge Group, a
premier research and marketing consulting firm serving the needs
of high-tech vendors and service providers. Jon has more than 20
years experience in industry analysis and marketing, working with
more than 40 software, computer, and IT services companies. He
has a BA from Yale and an MBA from Harvard.
5 Implementation
47 Big Bang Not Required
47 Select the Project Team
48 Train the Team
49 Create Design Documents and a Project Plan
51 Install the Micro-Segmentation Solution
52 Integrate Logs, Events, and Alerts
53 Prioritize Application Groups
57 Discovery and Visibility
60 Model Policies
62 Test Policies
63 Be Ready to Fix Problems
64 Extend and Refine
We hope that by reading this guide you will not only understand
micro-segmentation better, but also see how it can make your
organization more secure and more agile.
4 Use Cases
Explores important use cases of micro-segmentation, and explains
how it can be applied at progressively more granular levels.
Most areas of IT have been able to keep pace with these rapid
changes by automating. They have introduced new concepts and
automated tools in areas like virtualization, service orchestration,
continuous deployment, and software-defined networking (SDN).
Today most data centers are divided into large zones, as illustrated
in Figure 1-1. Traffic between the zones runs through a few choke
points, typically firewalls. Traffic filtering policies are configured
on each firewall.
In the network
On hosts
On cloud platforms
Note that a little extra granularity can go a long way. You can
strengthen security significantly just by fencing off a few high-
value applications, or separating development and test systems
from production environments.
Dynamic Segmentation
In today’s dynamic environments, granular segmentation
would be impractical if administrators have to manually
create and manage security rules on every enforcement point.
More enforcement points would lead to less flexibility, more
opportunities for error, and impossibly long workdays for security
and network administrators.
The great challenge for this type of access control is that the
number of potential connections among software modules expands
almost exponentially. As shown in Figure 2-1, if you have four
software modules, there are six potential connections between
them. Add two more modules, and there are 15 connections. Go to
10 modules and you have 45 connections.
Network Equipment
One approach is to use network equipment, such as switches,
routers, and load balancers, as enforcement points for security
policies.
Hypervisors
Hypervisor-based micro-segmentation involves adding firewall-
like capabilities to the hypervisor layer of a virtualization
Host-based Software
A third approach to micro-segmentation takes advantage of
software built into major operating systems. The most important
of these are iptables on Linux systems and the Windows Filtering
Platform (WFP) on Windows servers.
Application Owners
Micro-segmentation can isolate applications from each other.
It allows security policies to be defined on an application-by-
application basis, insulated from other applications and from
issues related to the underlying infrastructure. That means that
“application owners,” the software developers or administrators
with the deepest knowledge of each application, can fully
participate in designing and updating the security policies for their
applications.
The team developing the application therefore has control over the
speed at which the application can be secured.
Communication protocols
The first problem with this approach is that IP addresses are rarely
statically assigned. They change, especially in the cloud. Policies
based on IP addresses can quickly become obsolete.
If you want to move the web front end to the cloud six months
later, someone (maybe not the same person who created the
rules) has to go back, find all of the relevant rules, and modify
them to account for new IP addresses, WAN connections, different
protocols, and different firewalls.
Dynamic Micro-Segmentation
Dynamic micro-segmentation solutions take a different approach.
They define rules based on applications, workloads, and the
relationships among them. That allows them to adjust rules
automatically as applications and environments evolve.
Note:
The micro-segmentation product category is fairly new, and
not all solutions have the dynamic capabilities mentioned
here or elsewhere in this guide. Please evaluate specific
products carefully to make sure they have the features that are
important to your organization.
Architecture
Most micro-segmentation solutions have two basic architectural
components, as illustrated in Figure 3-1.
For example:
Micro-Segmenting Applications
Micro-segmentation can put a fence around applications and limit
the ability of attackers to move laterally between applications.
This capability is especially valuable for high-value software such
as:
The red lines in Figure 4-1 indicate connections that are not
allowed by policy. The micro-segmentation solution can either
block these connections, or keep them open and generate alerts to
the SOC when they are used.
Application Segmentation
Isolating applications from one another provides the obvious
advantage of preventing attackers who have compromised one
application from moving laterally to reach others. It also reduces
the exposure of an application to a bad actor.
Process Segmentation
Some applications, notably Microsoft Active Directory, use large,
dynamic port ranges during operation. Conventional firewalls,
as well as micro-segmentation solutions that rely on network
equipment, cannot adjust for dynamically changing ports. This
inflexibility creates a dilemma for administrators:
An executive sponsor
A project manager
A tech lead
Application teams
All this work should culminate in a deployment plan that lists the
dates, dependencies, and responsible parties. Make sure that the
project team and executive management agree on the plan.
Note:
As you create the plan, avoid the temptation to try to obtain
all possible benefits in the initial coarse-grained segmentation
deployment. Focus on providing an improved level of
segmentation compared to the baseline, and a stable beginning
to a label-based, meta-driven model. Your implementation
will evolve as the organization develops institutional
knowledge and habits around a new way of securing and
automating the infrastructure.
Given this environment, the best initial policies are rarely the
same as the tightest security policies. Start with visibility and
monitoring, or with a basic level of enforcement. You can refine
and tighten the policies as you gain experience.
Ease of micro-segmentation
Core Services
Every organization has a collection of core networking and
computing services. These include DNS and DHCP servers, Active
Directory and other organization directories, VPN concentrators,
SIEM, log management, network and systems monitoring
products, and backup services.
Key Projects
Most organizations’ IT groups have a few key projects where
micro-segmentation can play an important role in improving
security, increasing agility, and even ensuring completion on time.
Use the data you collect to catalog and classify the applications
and workloads.
That capability also means that the same policy can be applied
automatically to new instances as soon as they are created. If
your cloud platform starts creating more copies of the customer
After creating broad default policies across the board, you can
circle back and write more granular rules for selected critical
systems. Be selective about where to dive deep. Not all applications
and workloads are equal, and those with less risk can wait a little
bit longer. Those with critical importance should be given more
granular security policies first.
In fact, there are several steps you should take to be ready for the
big rollout.
Have a “Tiger Team” ready for rapid response. If you have done a
good job of testing, you may not see any issues at first. But when
nobody is looking, a communication pattern will change, most
likely in the middle of the night. Be sure the security, operations,
and application teams are on alert for several days after the move
to enforcement.
Examine factors that will help you select the most appropriate
micro-segmentation solution
Enforcement Points
In Chapter 2 we looked at three different types of enforcement
points. There are pros and cons for each.
Visualization
It is extremely important to have good tools for visualizing
applications, workloads, and the connections between them. Look
for visualization tools that are tightly integrated with the rest of
the micro-segmentation solution and that make it easy to:
Policy Modeling
Natural Language
Natural language policies offer several huge advantages:
The more natural language, and the fewer network constructs, the
better.
Testing
Look for solutions that allow you to test policies by simulating
communication flows, observing actual application behaviors, or
both.
You will get even more value from the testing tool if it allows
you to monitor communication flows on an ongoing basis, detect
anomalies, and generate alerts for suspicious events.