IronSights
All insights

security awareness

Network Segmentation: A Practical Guide for Australian Business

Network segmentation limits lateral movement after a breach. An attacker who compromises one system should not be able to freely access every other system in the environment. Most small business networks are completely flat.

By Ryan Balloot, Managing Director18 November 20242 min read

A flat network — one where every device can communicate freely with every other device — is a significant security liability. An attacker who compromises a single endpoint on a flat network has potential access to every other system: servers, network-attached storage, management interfaces, CCTV systems, and printers. Segmentation limits that reach.

The Business Case for Segmentation

Network segmentation directly addresses the lateral movement stage of a cyber attack. An attacker who cannot reach high-value systems from the compromised device is constrained. Segmentation is the control that most directly limits the blast radius of a successful initial compromise.

Practical Segmentation for an SMB

For most small businesses, meaningful segmentation is achievable with managed switches and a business-grade firewall/router that supports VLANs. Core segments to create: corporate workstations and servers, guest and uncontrolled Wi-Fi, IoT and physical security devices (CCTV, access control), and management network for infrastructure administration.

Firewall Rules Between Segments

Segmentation is only effective with appropriate firewall rules controlling inter-segment traffic. Allow only the specific traffic required for legitimate business functions. Log and alert on traffic that violates those rules. Review firewall rules regularly — rule bloat over time often reintroduces the flat network problem at the firewall level.

Cloud and Hybrid Environments

Segmentation extends to cloud environments. Azure virtual networks, network security groups, and private endpoints provide equivalent segmentation capability for cloud resources. Hybrid environments — where on-premises and cloud systems communicate — require particular attention to ensure cloud boundaries are not bypassed by overly permissive on-premises-to-cloud connectivity.

Does network segmentation count toward Essential Eight?

Network segmentation is not one of the eight controls but it is referenced in the Essential Eight guidance as a compensating and supporting control. It is specifically recommended in the context of limiting the impact of incidents and supporting incident response. It is also assessed in the ACSC's Information Security Manual (ISM) for organisations with broader regulatory requirements.

Keep reading

More from the IronSights team.