SlideShare a Scribd company logo
Micro-Segmentation Strategies
The benefits, challenges and how to get it
done
Yoni Geva
Product Manager
WELCOME
Have a question? Submit it via the chat tab or email us:
This webinar is being recorded!
The recording will be emailed to you after the webinar
And the slides will be available in the Attachments tab
Follow us online !
2
marketing@algosec.com
POLL #1: What are your plans for building a micro-
segmentation strategy?
• Already in place
• Planning to implement this year
• Planning to implement over the next 2 years
3
• No plans
Please vote using the “Votes“ tab
2019 02-20 micro-segmentation based network security strategies (yoni geva)
AGENDA: MICRO-SEGMENTATION
Background & today’s risks
Why Micro-segmentation is part of the answer
The challenges you may face
Building, implementing and maintaining a Micro-segmentation strategy
01
02
03
04
THE BASICS
LEGACY DATA CENTER ARCHITECTURE
Users Servers Outside World,
Business partners
Perimeter
Firewall
East-West traffic North-South traffic
• No filtering capabilities controlling east-west traffic
• Allows unrestricted traffic
• Between internal users’ desktop/laptops and servers
• Between servers in different segments
ONCE ATTACKERS GAIN A FOOTHOLD – FREE LATERAL MOVEMENT
WHY THIS IS RISKY
SEGMENTED DATA CENTER ARCHITECTURE
Users Zone Server Zone
2
Outside World,
Business partners,
Perimeter
Firewall
Server Zone
1
East-West traffic North-South traffic
• Introduce filtering choke-points between zones
• Allows control of east-west traffic
• Lets organizations restrict lateral movement between zones
• How can we make this a reality?
SEGMENTED  MORE SECURE
SEGMENTATION CHALLENGES
CHALLENGE #1: INTRODUCING CHOKE POINTS
A major effort involving:
• Hardware
• Cabling
• Reconfigure switching and
routing
• Firewall configuration
TRADITIONAL DATA CENTER
• Built-in firewalls as part of
the infrastructure
• No extra hardware needed
VIRTUALIZED NETWORK / SDN
CHALLENGE #2: ZONING DEFINITION
• How many zones to define?
• Which subnets should
reside in each zone?
Better Security
Micro-segmentation
Define many small zones
Maintenance - Define
the right policy
N zones  N*N traffic
directions
A ZONING TRADE-OFF
CHALLENGE #3: FILTERING POLICY BETWEEN ZONES
Did you know?
VMware NSX’s default
policy is “allow all”
• Traffic between zones must be
explicitly allowed by policy
• No critical business traffic will be
blocked by accident
• Challenge: discover and characterize
this traffic
MICRO-
SEGMENTATION
IS GETTING
COMPLICATED
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
MICRO-SEGMENTATION IS GETTING COMPLICATED
SEGMENTATION STRATEGIES
MICRO-SEGMENTATION FLOW
Security
Management
Sensitive Assts
Processes
Running Applications
Zoning
FW Openings
THE BUSINESS-APPLICATION PERSPECTIVE
• East-West traffic is generated by business applications
• Each business application has:
• Servers supporting it
• Clients accessing it
• Business application connectivity requirements:
• Server-to-server traffic flows
• Client-to-server traffic flows
§
SEGMENTATION FOR BUSINESS APPLICATIONS
Human-accessible
Systems
Application
Servers
Infrastructure
Servers
POLL #2:
Do you have
Application
Documentation?
YES!
Application Servers
and Flows
No Partial I don’t know
01 02 03 04
Please vote using
the “Votes“ tab
IS YOUR ORGANIZATION DISCIPLINED?
Yes if:
• All applications are documented
• Applications’ connectivity requirements
are documented
• Documentation is machine readable
Then “discovery” is easy!
What if documentation is
missing / outdated ?
DISCOVERY FROM TRAFFIC
NetFlow / sFlow
• Routers
• VMWare virtual switch
• NetFlow statistics broker
Full capture traffic
• Switches
• Network TAP devices
• Packet broker
Summarize
Analyze
Correlate
27
IMPORT INTO BUSINESSFLOW
28
28
29
29
2019 02-20 micro-segmentation based network security strategies (yoni geva)
31
ASSETS/PROCESSES/USERS - PERSPECTIVE
• Define your most sensitive assets
• Identify processes and relationships
between units in the company
• Identify user requirements: which data
is required by each user
DOCUMENT THE CONNECTIVITY MATRIX
34
34
MAINTAINING THE SEGMENTATION
• Application connectivity
requirements evolve
• Filtering policies need
to change over time
• Application-aware and
change V management
processes
• Visibility filtering policies
comply with zoning
Zoning remains stable over time, however:
CHANGE MANAGEMENT PROCESSES
GOAL:
SINGLE CHANGE WORKFLOW
FOR ALL FILTERING
TECHNOLOGIES
37
38
39
MICRO-SEGMENTATION SUMMARY
Security
Management
Sensitive Assts
Processes
Running Applications
Zoning
FW Openings
REMEMBER:
Focusing your
security on
external threats
is not enough
WHITEPAPER SOLUTION BROCHURE
PROF. WOOL VIDEO COURSE
https://www.algosec.com/resources
PPT
Q & A
Submit your questions via the chat
Request a Demo: marketing@algosec.com
44
JOIN OUR COMMUNITY
Follow us for the latest on security policy management trends, tips & tricks,
best practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos
presented by Professor Wool
youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
ALGOSUMMIT
THE PREMIER EVENT FOR ALGOSEC CUSTOMERS AND CHANNEL PARTNERS
45
AlgoSummit APAC
Bangkok
April 1-5
2019
www.algosec.com/algosummit
AlgoSummit EMEA
Lisbon
May 20-23
THANK YOU!
Questions can be emailed to
marketing@algosec.com

More Related Content

PDF
Open dns configuring opendns on aruba controller
PDF
WebLogic 12c & WebLogic Mgmt Pack
PPTX
EMEA Airheads- Aruba 8.x Architecture overview & UI Navigation
PDF
VRD-Indoor80211n 2012 05-31
PDF
CyberArk Interview.pdf
PPTX
EMEA Airheads - AP Discovery Logic and AP Deployment
PPTX
9월 웨비나 - AWS 클라우드 보안의 이해 (양승도 솔루션즈 아키텍트)
Open dns configuring opendns on aruba controller
WebLogic 12c & WebLogic Mgmt Pack
EMEA Airheads- Aruba 8.x Architecture overview & UI Navigation
VRD-Indoor80211n 2012 05-31
CyberArk Interview.pdf
EMEA Airheads - AP Discovery Logic and AP Deployment
9월 웨비나 - AWS 클라우드 보안의 이해 (양승도 솔루션즈 아키텍트)

What's hot (20)

PDF
Secure your network - Segmentation and segregation
PDF
ServiceNow & Jira Integration
PPTX
Palo Alto Networks 28.5.2013
PPTX
Aruba Netwrok(1).pptx
PPTX
EMEA Airheads- Manage Devices at Branch Office (BOC)
PPTX
Airheads Tech Talks: Advanced Clustering in AOS 8.x
PDF
SIEM Architecture
PDF
[금융고객을 위한 Resiliency in the Cloud] 최근 대규모 장애 사태 여파에 따른 DR 도...
PPTX
PPTX
컨테이너 기술과 가상화 기술의 주요한 차이점
PDF
AWS Summit Seoul 2023 | 지능화되는 랜섬웨어 위협으로부터 지킬 것인가? 당할 것인가?
PDF
Air group configuration howto with clearpass 6 v1.2(1)
PDF
Palo Alto Networks y la tecnología de Next Generation Firewall
PPTX
금융It시스템의 이해 2편
DOCX
advantages and disadvantages of using centralized network management v.docx
PPTX
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
PDF
Deep Dive into OAuth for Connected Apps
PDF
Campus Network Design version 8
PDF
PPTX
CyberArk
Secure your network - Segmentation and segregation
ServiceNow & Jira Integration
Palo Alto Networks 28.5.2013
Aruba Netwrok(1).pptx
EMEA Airheads- Manage Devices at Branch Office (BOC)
Airheads Tech Talks: Advanced Clustering in AOS 8.x
SIEM Architecture
[금융고객을 위한 Resiliency in the Cloud] 최근 대규모 장애 사태 여파에 따른 DR 도...
컨테이너 기술과 가상화 기술의 주요한 차이점
AWS Summit Seoul 2023 | 지능화되는 랜섬웨어 위협으로부터 지킬 것인가? 당할 것인가?
Air group configuration howto with clearpass 6 v1.2(1)
Palo Alto Networks y la tecnología de Next Generation Firewall
금융It시스템의 이해 2편
advantages and disadvantages of using centralized network management v.docx
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Deep Dive into OAuth for Connected Apps
Campus Network Design version 8
CyberArk
Ad

Similar to 2019 02-20 micro-segmentation based network security strategies (yoni geva) (20)

PDF
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
PPT
Create and Manage a Micro-Segmented Data Center – Best Practices
PDF
Migrating and Managing Security Policies in a Segmented Data Center
PDF
Microsegmentation from strategy to execution
PPTX
Security Zone and Network segmention 3.pptx
PDF
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
PDF
What is micro segmentation?
PPTX
Ransomware Attack: Best Practices to proactively prevent contain and respond
PPTX
Segmenting your Network for Security - The Good, the Bad and the Ugly
PPTX
A business driven approach to security policy management a technical perspec...
PPTX
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
PDF
Microsegmentation for enterprise data centers
PDF
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
PPTX
How to secure your industrial network using segmentation and segregation
PPTX
Application visibility across the security estate the value and the vision ...
PDF
President Donald Trump - Cybersecurity - National Institute of Standards and ...
PDF
Modern Security for the Modern Data Center
PPTX
Are Your Mission Critical Applications Really Performing?
PDF
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
PPT
Network Physics
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
Create and Manage a Micro-Segmented Data Center – Best Practices
Migrating and Managing Security Policies in a Segmented Data Center
Microsegmentation from strategy to execution
Security Zone and Network segmention 3.pptx
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
What is micro segmentation?
Ransomware Attack: Best Practices to proactively prevent contain and respond
Segmenting your Network for Security - The Good, the Bad and the Ugly
A business driven approach to security policy management a technical perspec...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Microsegmentation for enterprise data centers
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
How to secure your industrial network using segmentation and segregation
Application visibility across the security estate the value and the vision ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
Modern Security for the Modern Data Center
Are Your Mission Critical Applications Really Performing?
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Network Physics
Ad

More from AlgoSec (20)

PDF
best practices-managing_security_in_the hybrid cloud
PDF
compliance made easy. pass your audits stress-free webinar
PDF
The state of the cloud csa survey webinar
PDF
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
PDF
2021 01-27 reducing risk of ransomware webinar
PDF
Compliance made easy. Pass your audits stress-free.
PDF
2021 01-13 reducing risk-of_ransomware
PDF
Cloud migrations made simpler safe secure and successful migrations
PDF
Build and enforce defense in depth - an algo sec-cisco tetration webinar
PDF
Radically reduce firewall rules with application-driven rule recertification
PDF
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
PDF
2020 04-07 webinar slides -turning network security alerts into action change...
PPT
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
PPTX
Put out audit security fires, pass audits -every time
PPTX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
PPTX
2019 08-13 selecting the right security policy management solution
PPTX
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
PPTX
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
PPT
More Things You Can Do with the AlgoSec Security Policy Management Suite
PPTX
2018 11-19 improving business agility with security policy automation final
best practices-managing_security_in_the hybrid cloud
compliance made easy. pass your audits stress-free webinar
The state of the cloud csa survey webinar
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 01-27 reducing risk of ransomware webinar
Compliance made easy. Pass your audits stress-free.
2021 01-13 reducing risk-of_ransomware
Cloud migrations made simpler safe secure and successful migrations
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Radically reduce firewall rules with application-driven rule recertification
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 04-07 webinar slides -turning network security alerts into action change...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Put out audit security fires, pass audits -every time
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
2019 08-13 selecting the right security policy management solution
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
More Things You Can Do with the AlgoSec Security Policy Management Suite
2018 11-19 improving business agility with security policy automation final

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Approach and Philosophy of On baking technology
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
Network Security Unit 5.pdf for BCA BBA.
Programs and apps: productivity, graphics, security and other tools
Approach and Philosophy of On baking technology
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

2019 02-20 micro-segmentation based network security strategies (yoni geva)

Editor's Notes

  • #5: 3 years ago, four men managed to break into Hatton Garden, a Safe Deposit Company in London. They manage to steal almost 200M£ by Drilling through 50 cm of a concrete wall Once they made it in - there was no security inside
  • #7: Let us start with the basics
  • #8: Example of a legacy data center : In gray: Data center’s components In blue: Perimeter FW AND the outside world (Internet / other businesses) Terminology: 1. North-South traffic – in and out of the data center 2. East-West (the lateral movement) – internal traffic between servers and between servers and users This legacy setup is risky.
  • #9: Why is it risky? No filtering east-west traffic  unrestricted traffic is allowed between internal users  servers servers  servers Like in the Hatton Garden case
  • #10: Improve security: Internal filtering points (FW and filtering devices) Creating several zones: separated from each other
  • #11: Segmented  Secure Choke Points between east-west traffic ….. How can we make this a reality?
  • #12: As with almost anything in life, It’s not that simple….. let’s discuss why….
  • #14: How to define zones? How many Definition (Subnet, IP-Range) Policy between Zones
  • #15: trade-off for micro-segments : Data center security  High maintenance (complexity)
  • #16: Our last challenge: Risk: Blocking critical applications Challenge: Discover and characterize this traffic BTW: Did you know: VMware NSX’s default policy is “allow all” – works BUT insecure
  • #18: Amazon Example: Managing the operation of the warehouse gets complicated  Bring Automation Moving Robots Fully automated warehouse
  • #19: Let the employees focus of the important stuff
  • #20: Bring back to it security
  • #23: Business application perspective: East-West traffic: Business applications Servers Clients Listen to the traffic and  Communications require FW openings. Zoning definitions
  • #24: Some best practices, without discovery Human-accessible systems | separate zone from servers Desktops / Laptops / Smartphones Servers belonging to 1 application  in same zone Infrastructure servers (of multiple applications)  in a dedicated zone
  • #26: If we have a documentation of the Application  Use it for the segmentation No documentation  We will need to listen to the network
  • #27: Discovery technologies: Listen to the network NetFlow / sFlow Full capture Create Business Application
  • #28: With AlgoSec BusinessFlow you can start this process using a dedicated discovery tool that will automate the steps mentioned.
  • #33: What are the theoretical needs Define your most sensitive assets Identify processes in the company Identify user requirements (servers, data)
  • #34: Zones definition: Subnets, IP-Ranges Policy between zones
  • #36: Applications are changing FW openings need updates  Change management system Visibility capabilities (routing, filtering)
  • #37: Due to the complexity is the system  Single change management system
  • #38: With AlgoSec FireFlow the change management process is very simple: Identical for North-South and East-West Indifferent to network technology Firewall-vendor agnostic
  • #39: Outside data center (traditional) Inside data center (virtualized) (NSX)
  • #40: In this topology view we can easily see the highlighted firewalls that require changes And, with a click of the button I can implement the required changes in these firewalls It’s simple and keeps you secure
  • #41: Let’s recap what we just discussed since we just reviewed the best practices for implementing a micro-segmentation strategy effectively
  • #43: AlgoSec has a full line up of resources in our website, we welcome you to learn more about our offering by reading The network security policy management lifecycle whitepaper Our datasheet on how to simplify and accelerate large-scale application migration projects In addition to the Prof. Wool Video course on how to mange dynamic objects in Cloud environments
  • #44: Now, let’s open up the floor for some Q & A questions. Seed question 1: If I have a hybrid infrastructure and I would like to have a micro-segmentation strategy – can AlgoSec’s platform support it? Seed question 2: Is there a way to tell if as part of the segmentation process we missed some applications – or over time new applications were added or removed. Answer – yes… for example in the vmware nsx screen we saw…. Seed question 3: I don’t have any documentation of the applications running in my network, I have 2 vendors and no way of knowing for sure what is running? Answer – you really need to get the discovery done right, for the first phase you need a good auto-discovery solution and then, the next step would be to make sure that the solution, such as AlgoSec’s is connected to all your devices
  • #45: We welcome you to connect with us through our social networks in LinkedIn, Facebook, Twitter and our blog.
  • #46: And, before we part – AlgoSummit and Upcoming webinar