From the course: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Designing for network segmentation and micro-segmentation

Designing for network segmentation and micro-segmentation

- [Instructor] One vendor, one foothold, 40 million customers compromised. That's the story of a Target breach in 2013. Attackers didn't have Target's payment system directly. They entered through a third party HVAC vendor. Once inside, there were no barriers, no segmentation, just an open path to the crown jewels. The result, over $200 million in losses, lawsuits, and millions of stolen credit cards. In today's environment, lateral movement is the attacker's power move, and segmentations is your countermeasure. Let's see why segmentation matters. In this Target breach, attackers entered through a trusted vendor with network access to HVAC systems, but there were no segmentation, which means attackers moved from the vendor system to the internal network and ultimately, to the payment processing servers. The breach could have been stopped or at least contained if critical systems were isolated into protected zones.…

Contents