You have probably already heard the term network segmentation and understand the technical underpinnings of network segmentation. Network segmentation is the process by which we divide the network into logical groupings to protect pieces of the network from each other. Network segmentation is often a physical segmentation where we put one piece of the network on one physical infrastructure and another piece of the network on another physical infrastructure. Of course, that would mean the two pieces cannot talk to each other, so we have to put linkages in between (i.e., break our segmentation). Those linkages are sometimes created with routers, sometimes with VLANs. We are not enamored with the idea of using VLANs for network segmentation. It is fine in a test environment, but in a production environment, VLANs are too fragile. They depend on a solid build of the OS that runs the switches, one with no bugs in it. Switches and routers are running software, too, and they have vulnerabilities as well. Hardware has vulnerabilities, too, as the sidebar on the topic explains.
Clearly, relying on the network infrastructure as a protective measure should only be done if you understand the risks to that network infrastructure and treat it as a valuable asset to protect just like any other. Chapter 8 explained that more-sensitive systems must never depend on less-sensitive systems for their security. The goal of network segmentation is to create virtual walls within your network, across which no dependencies may transit. At a high level, this may look like Figure 9-1. For a realistic network, it gets a bit more complicated. We start out by taking the model shown in Figure 9-4 and abstract it a bit. Then we add information on the types of traffic needed between systems in the network. This yields a picture such as shown in Figure 9-6. Figure 9-6. Start segmentation by abstracting and annotating our DFD.
This picture highlights some clear groups of systems within the network. For example, it is clear that Web farm 1 and SQL cluster 1 need to communicate with each other, but there is no communication necessary between either of those systems and Web farm 2/SQL cluster 2. This is fairly obvious actually if you consider that those systems are essentially different properties. Each of those groupings form a "pod" of systems, which may be segmented to enforce the natural divisions within the network. If no communication needs to happen between systems, we can put them on different segments, particularly if they have differing security requirements. For instance, pod 1 may be the Human Resources system and pod 2 may be the Order Entry system.
The initial segmentation is not complete, however. There are transitive dependencies to account for. For instance, both pods need to speak to the domain controller and the Terminal Server, as well as to clients on the Internet. Obviously, clients on the Internet are not part of any of our segmentsthey are part of the "horrible unknown," which receives no implicit trust at all. The DCs are similarly interesting. Segments are mutually exclusive, so a system cannot be part of more than one segment at the same time. In fact, the DCs are really their own segment. Think of it this way: The DCs hold the keys to the kingdom. Their compromise means the compromise of all systems in the network. Therefore, they clearly have the highest sensitivity. It may be useful here to assign a numeric sensitivity level to the segments. The DC segment, for example, may get 100, whereas pod 1 gets 95 and pod 2 gets 80. The numbers are really arbitrary, and we only use them to get relative measures. After we understand more about the segments, we can break the diagram apart and model each segment with trust boundaries, as shown in Figure 9-7. Figure 9-7. During segmentation we annotate the diagram with trust boundaries.
A trust boundary is essentially the definition of a segment; it defines the segment border. Systems inside a trust boundary all have the same general security requirements and can be treated collectively. Systems outside the trust boundary are part of a different segment and need to be protected from all lower-level segments. In Figure 9-7, this is highlighted by the fact that the domain controller is not part of the segment that contains pod 1; it needs to be protected from that pod. After you have created the logical segmentation, you must implement it. That happens in the restriction stage |