From the course: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Designing for network segmentation and micro-segmentation
From the course: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Designing for network segmentation and micro-segmentation
- [Instructor] One vendor, one foothold, 40 million customers compromised. That's the story of a Target breach in 2013. Attackers didn't have Target's payment system directly. They entered through a third party HVAC vendor. Once inside, there were no barriers, no segmentation, just an open path to the crown jewels. The result, over $200 million in losses, lawsuits, and millions of stolen credit cards. In today's environment, lateral movement is the attacker's power move, and segmentations is your countermeasure. Let's see why segmentation matters. In this Target breach, attackers entered through a trusted vendor with network access to HVAC systems, but there were no segmentation, which means attackers moved from the vendor system to the internal network and ultimately, to the payment processing servers. The breach could have been stopped or at least contained if critical systems were isolated into protected zones.…
Contents
-
-
-
-
(Locked)
Building a Zero Trust reference architecture7m 17s
-
(Locked)
Policy decision and enforcement points (PDP/PEP)3m 50s
-
(Locked)
Software-defined perimeters (SDP) and secure access4m 28s
-
(Locked)
Designing for network segmentation and micro-segmentation4m 39s
-
(Locked)
Create a segmentation plan4m 19s
-
(Locked)
Securing multi-cloud and hybrid environments4m 16s
-
(Locked)
-
-
-