Mikrosegmentierung
Microsegmentation divides networks into isolated segments at the workload level—providing greater granularity than traditional VLAN segmentation. Each application, VM, or container is assigned its own firewall rules. This makes it significantly more difficult for ransomware and lateral movement to spread, as compromised systems cannot establish direct connections to other workloads.
Microsegmentation is fine-grained network isolation at the workload level. While traditional segmentation (VLANs, firewalls) divides the network into large zones, microsegmentation controls communication between individual systems, applications, or containers. It is a central element of zero-trust architecture.
Microsegmentation vs. Traditional Segmentation
Comparison: VLAN vs. Microsegmentation
Traditional VLAN Segmentation:
Client VLAN (10.0.10.0/24)
→ Workstation-01
→ Workstation-02
→ Workstation-03
Server VLAN (10.0.20.0/24)
→ Web Server
→ App Server
→ DB Server
→ File Server
Firewall: Client VLAN → Server VLAN: allowed (SMB, RDP, HTTP)
Problem: Workstation-01 compromised → reaches ALL servers in the Server VLAN!
Micro-segmentation:
Each VM has its own policy:
Workstation-01 → allowed: File Server:445 (SMB), Web Server:443
→ NOT allowed: DB Server, App Server directly
Web Server → allowed: App Server:8080
→ NOT allowed: DB Server directly!
App-Server → allowed: DB-Server:5432
→ NOT allowed: direct Internet access
DB-Server → allowed: incoming traffic from App-Server:5432
→ NOT allowed: any outgoing traffic!
Result: Compromised web server → CAN ONLY access app server via 8080
No SMB, no RDP, no port scanning possible!
Implementation Technologies
Technical Microsegmentation:
1. Host-based firewall (easiest entry point):
→ Windows Defender Firewall: Configure rules per system
→ iptables/nftables (Linux): host-level firewall
→ Centralized management: SCCM, Ansible, Puppet
→ Scalability issue: 1,000 systems = managing 1,000 firewalls
2. Software-Defined Networking (SDN):
VMware NSX:
→ Microsegmentation for VMware environments
→ "Distributed Firewall": Rules at the vNIC level
→ Centralized policy management for all VMs
→ Automatic segmentation of new VMs via tagging
Illumio / Guardicore:
→ Agent-based: installed on every workload
→ Automatic application dependency mapping
→ Policy recommendations based on communication patterns
→ Good for cloud + on-premises + containers
3. Kubernetes Network Policies:
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: allow-frontend-to-backend
spec:
podSelector:
matchLabels:
app: backend
ingress:
- from:
- podSelector:
matchLabels:
app: frontend
ports:
- protocol: TCP
port: 8080
egress:
- to:
- podSelector:
matchLabels:
app: database
ports:
- protocol: TCP
port: 5432
4. eBPF-based segmentation (Cilium):
→ Layer-7 policies: HTTP path, method, headers
→ Example: Backend only allows GET /api/products from the frontend
→ Extremely high performance: in the Linux kernel, no proxy
→ Kubernetes-native
Automatic policy design:
Problem: How do I know what communication is normal?
Solution: Discovery phase
1. Microsegmentation tool in "Learn" mode
2. Monitors normal traffic (2–4 weeks)
3. Automatically generates recommended policies
4. Admin reviews and activates
→ Tools: Illumio Illuminate, VMware NSX Intelligence
Use Cases and Priorities
Where microsegmentation is most critical:
Highest priority:
1. Database servers:
→ Accessible only from the application server, on a specific port
→ No direct access from workstations!
→ No outbound traffic from the DB (no C2 callback!)
2. Domain Controller / Active Directory:
→ Only LDAP (389/636), Kerberos (88), DNS (53) from known systems
→ No direct admin sessions from normal workstations
→ Jump host as the only path to DCs
3. Backup Server:
→ Only incoming backup agent traffic (specific ports)
→ NO outbound traffic to the Internet
→ No access to backup from compromised workstations!
→ Ransomware cannot encrypt backups!
4. Production Systems / OT:
→ Complete isolation from the office network
→ Only defined communication to HMI/SCADA
Medium priority:
5. Development vs. production environment:
→ Developer PCs must not access production databases
6. Cloud workloads:
→ Security Groups (AWS), NSGs (Azure) for microsegmentation
Measuring the security gain:
→ Blast radius of a compromised system: how many other systems are reachable?
Before: 1 compromised server → 250 others directly reachable
After: 1 compromised server → 5 others directly reachable (only app dependencies)
→ 98% reduction in blast radius!