Microsegmentation is a network security approach that enables security architects to construct network security zones boundaries per machine in data centers and cloud deployments in order to segregate and secure workloads independently.[1][2]
It is now also used on the client network as well as the data center network.
There are three main types of microsegmentation:
Microsegmentation allows defenders to thwart almost any attack methods by closing off attack vectors within internal networks so that the attackers are stopped in their tracks.[4]
Microsegmentation in internet of things (IoT) environments can help businesses gain command over the increasing volume of lateral communication taking place between devices, which is currently unmanaged by perimeter-focused security measures.[5]
Implementing and maintaining microsegmentation can be difficult.[4] The first deployment is always the most challenging.[4] Some applications may not be able to support microsegmentation, and the process of implementing microsegmentation may cause other problems.[4]
Defining policies that meet the requirements of every internal system is another potential roadblock. Internal conflicts may occur as policies and their ramifications are considered and defined, making this a difficult and time-consuming process for certain adopters.[4]
Network connection between high and low-sensitivity assets inside the same security boundary requires knowledge of which ports and protocols must be open and in which direction. Inadvertent network disruptions are a risk of sloppy implementation.[4]
Microsegmentation is widely compatible with environments running common operating systems including Linux, Windows, and MacOS. However, this is not the case for companies that rely on mainframes or other outdated forms of technology.[4]
To reap the benefits of microsegmentation despite its challenges, companies have developed solutions by using automation and self service.[6]