0% found this document useful (0 votes)
11 views1 page

Layering Network Security Segmentation Infographic 508 0

Uploaded by

tominc.neza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

Layering Network Security Segmentation Infographic 508 0

Uploaded by

tominc.neza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

JANUARY 2022

LAYERING
NETWORK SECURITY
THROUGH SEGMENTATION
An effective technique to strengthen security, network segmentation is a physical or virtual architectural approach dividing a network into multiple segments, each acting
as its own subnetwork providing additional security and control. Creating boundaries between the operational technology (OT) and information technology (IT) networks
reduces many risks associated with the IT network, such as threats caused by phishing attacks. Segmentation limits access to devices, data, and applications and
restricts communications between networks. Segmentation also separates and protects OT network layers to ensure industrial and other critical processes function as
intended. Properly implemented Demilitarized Zones1 (DMZs) and firewalls can prevent a malicious actor’s attempts to access high-value assets by shielding the network
from unauthorized access. Firewalls can be configured to block traffic from network addresses, applications, or ports while allowing necessary data through. Policies and
controls should also be used to monitor and regulate system access and the movement of traffic between zones.
The following graphics illustrate the level of effort needed, with yellow representing low effort and red representing high effort, for attackers to breach and navigate an
unsegmented network versus a highly segmented network. These depictions are not to be construed as representing an engineering diagram for use in a production
environment nor is segmentation the only tool to secure a network.

FIGURE 1: UNSEGMENTED IT AND OT NETWORK FIGURE 2: A SEGMENTED PURDUE ENTERPRISE REFERENCE


ARCHITECTURE (PERA) NETWORK ARCHITECTURE
ATTACKER ATTACKER
LEVEL OF EFFORT LEVEL OF EFFORT

INTERNET INTERNET

FIREWALL

Only one level


of security
FIREWALL between
the control
DMZ WEB SERVERS/
system and
EMAIL SERVERS
the internet.

FIREWALL

Multiple levels of
IT/BUSINESS security between
NETWORK networks increases
the difficulty
DMZ IT/BUSINESS to access the
NETWORK control system.

FIREWALL
OT NETWORK

DMZ OT NETWORK HISTORIAN

SCADA/PLC
• Gauges • Alarms
• Sensors • RTUs
DMZ HMI FIELD CONTROLLERS

UNSEGMENTED IT AND OT NETWORKS INCREASE RISK2: BENEFITS OF SEGMENTING BETWEEN IT AND OT NETWORKS:
• OT networks are exposed to vulnerabilities in connected IT networks. • Segmented zones isolate and protect high-value assets and data.
• Easier for threat actors to move laterally after breaching the IT network. • Malicious traffic is easier to detect, prevent, and contain.
• Detecting threat actors is more difficult due to increased volume of • Threat actors must negotiate multiple firewalls and other protocols
network traffic. to access the OT environment.

1
Demilitarized Zone (DMZ): In networking, a DMZ is a physical or logical subnet that separates a local area network from other untrusted networks.
2
Since 2015, the Cybersecurity and Infrastructure Security Agency identified boundary protection as the most prevalent discovery in network security architecture assessments across multiple industries.
For additional information refer to NIST Special Publication (SP) 800-53, System and Communications Protection 7 (SC-7) Boundary Protection.

RECOMMENDATIONS:
Establish a segmented high security zone for high value assets and/or Allow only specific devices within the DMZ to connect to high value assets, and only
OT systems components. through specified connections.
Protect access to devices within this zone by using specific firewall Allow only specific users/devices to connect remotely to devices in this DMZ
access controls. to access high value servers.
Establish a DMZ for work that must be within the high security zone. Limit data traffic to the IT network with remote access control.

cisa.gov [email protected] Linkedin.com/company/cisagov @cisagov | @cyber | @uscert_gov Facebook.com/CISA @cisagov

You might also like