Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Articles

9/20/2019
07:00 AM
Ericka Chickowski
Ericka Chickowski
Edge Features
Connect Directly
Twitter
RSS
E-Mail
100%
0%

A Beginner's Guide to Microsegmentation

In a world in which the data center perimeter has all but evaporated, traditional segmentation no longer is enough. Enter microsegmentation. Here's what organizations need to do to maximize the benefits of this improved security architecture.

Take a Phased Approach
Experts recommend that organizations starting out with microsegmentation be realistic about how quickly they zoom out of the gate.

"Start by focusing on practical approaches instead of tackling a complete overhaul at the start," Stevens advises. "Get familiar with the basic steps of the process: identifying the way information flows in the business, build the segmented network based on the flow of information, create updated security policies, incorporate any necessary security capabilities, and then be prepared to continuously monitor and update the network." 

Entrust Datacard's Stenberg suggests a phased approach that takes on one application at a time. 

"This allows you to concentrate on high-priority targets and lock them down completely, while leaving other items in the same network under the same segmentation controls," he says. "To control the granularity, group assets based on the sensitivity of the data they process and store and based on who needs access to them." 

Not only should the microsegmentation program be broken into manageable pieces for phased rollout, but the deployment play should have discrete milestones and measurables that can show meaningful progress, says Nick Kael, CTO at Ericom Software.

"These programs can be complex and time-consuming, so showing progress along the way is critical," he says. 

Set Up Microsegmentation Sustainability
As the organization phases in more assets into microsegmentation, the team in charge needs to be mindful of the long-term play. As Woods explains, microsegmentation is not a "set-and-forget" strategy.

This means organizations need to establish both the long-term mechanisms to maintain visibility into data flows and the technical capabilities to flexibly maintain policy changes and enforcement requirements. It also means clearly delineating who does what to manage microsegmentation configuration.

"Roles and responsibilities for management of microsegmentation is also important," says SAP NS2's Wagner. "Changes to microsegmentation rules should go through a vetting process, like a configuration control board where the operations and security teams can validate the appropriateness of changes."

At the same time, the organization doesn't want to get bogged down with manual approval and change processes. So the organization should try to bake in automation to the maintenance process wherever possible. 

"Many of the laborious tasks required for microsegmentation can now be automated using machine learning," says Peter Smith, CEO and founder at Edgewise Networks. "These include figuring out how applications communicate with each other, the best set of rules that provide maximum coverage with the fewest number, and continuously keeping up with the changes, especially in cloud environments."  

The human operator will be the ultimate decision-maker with regard to policies, but automation should be able to help shrink down the process it takes to review everything. 

Long term, all of this effort to institute microsegmentation can help organizations greatly reduce the risk of inevitable security intrusions. It offers added security controls while maintaining the flexibility necessary to play nicely with modern workflows and hybrid infrastructure. And, ultimately, whether you call it adhering to the rule of least privilege or instituting zero trust, it helps security teams get back to the CIA triad of maintaining confidentiality, integrity, and availability of IT assets at the most granular levels.

Related Content:

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Edge Cartoon Contest: Need a Lift?
Flash Poll