Layering Network Security Segmentation Infographic 508 0
Layering Network Security Segmentation Infographic 508 0
LAYERING
NETWORK SECURITY
THROUGH SEGMENTATION
An effective technique to strengthen security, network segmentation is a physical or virtual architectural approach dividing a network into multiple segments, each acting
as its own subnetwork providing additional security and control. Creating boundaries between the operational technology (OT) and information technology (IT) networks
reduces many risks associated with the IT network, such as threats caused by phishing attacks. Segmentation limits access to devices, data, and applications and
restricts communications between networks. Segmentation also separates and protects OT network layers to ensure industrial and other critical processes function as
intended. Properly implemented Demilitarized Zones1 (DMZs) and firewalls can prevent a malicious actor’s attempts to access high-value assets by shielding the network
from unauthorized access. Firewalls can be configured to block traffic from network addresses, applications, or ports while allowing necessary data through. Policies and
controls should also be used to monitor and regulate system access and the movement of traffic between zones.
The following graphics illustrate the level of effort needed, with yellow representing low effort and red representing high effort, for attackers to breach and navigate an
unsegmented network versus a highly segmented network. These depictions are not to be construed as representing an engineering diagram for use in a production
environment nor is segmentation the only tool to secure a network.
INTERNET INTERNET
FIREWALL
FIREWALL
Multiple levels of
IT/BUSINESS security between
NETWORK networks increases
the difficulty
DMZ IT/BUSINESS to access the
NETWORK control system.
FIREWALL
OT NETWORK
SCADA/PLC
• Gauges • Alarms
• Sensors • RTUs
DMZ HMI FIELD CONTROLLERS
UNSEGMENTED IT AND OT NETWORKS INCREASE RISK2: BENEFITS OF SEGMENTING BETWEEN IT AND OT NETWORKS:
• OT networks are exposed to vulnerabilities in connected IT networks. • Segmented zones isolate and protect high-value assets and data.
• Easier for threat actors to move laterally after breaching the IT network. • Malicious traffic is easier to detect, prevent, and contain.
• Detecting threat actors is more difficult due to increased volume of • Threat actors must negotiate multiple firewalls and other protocols
network traffic. to access the OT environment.
1
Demilitarized Zone (DMZ): In networking, a DMZ is a physical or logical subnet that separates a local area network from other untrusted networks.
2
Since 2015, the Cybersecurity and Infrastructure Security Agency identified boundary protection as the most prevalent discovery in network security architecture assessments across multiple industries.
For additional information refer to NIST Special Publication (SP) 800-53, System and Communications Protection 7 (SC-7) Boundary Protection.
RECOMMENDATIONS:
Establish a segmented high security zone for high value assets and/or Allow only specific devices within the DMZ to connect to high value assets, and only
OT systems components. through specified connections.
Protect access to devices within this zone by using specific firewall Allow only specific users/devices to connect remotely to devices in this DMZ
access controls. to access high value servers.
Establish a DMZ for work that must be within the high security zone. Limit data traffic to the IT network with remote access control.