2020-08-13 21:34:35 +08:00
|
|
|
---
|
|
|
|
title: "Network Segmentation"
|
|
|
|
date: 2020-08-12T13:05:05+03:00
|
2020-08-26 16:51:38 +08:00
|
|
|
draft: false
|
2020-10-23 22:46:23 +08:00
|
|
|
description: "Verify your network is properly segmented."
|
|
|
|
weight: 4
|
2020-08-13 21:34:35 +08:00
|
|
|
---
|
|
|
|
|
|
|
|
## Overview
|
|
|
|
|
2020-10-23 17:30:38 +08:00
|
|
|
Segmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to
|
2020-10-23 22:46:23 +08:00
|
|
|
isolate workloads from one another and secure them individually, typically using policies. A useful way to test
|
|
|
|
the effectiveness of your segmentation is to ensure that your network segments are properly separated, e,g, your
|
|
|
|
Development is separated from your Production, your applications are separated from one another etc. Use the
|
|
|
|
Infection Monkey to verify that your network segmentation is configured properly. This way you make sure that
|
2021-01-28 02:13:25 +08:00
|
|
|
even if a certain attacker has breached your defenses, it can't move laterally between segments.
|
2020-08-13 21:34:35 +08:00
|
|
|
|
|
|
|
[Segmentation is key](https://www.guardicore.com/use-cases/micro-segmentation/) to protecting your network, reducing
|
|
|
|
the attack surface and minimizing the damage of a breach. The Monkey can help you test your segmentation settings with
|
|
|
|
its cross-segment traffic testing feature.
|
|
|
|
|
|
|
|
## Configuration
|
|
|
|
|
|
|
|
- **Network -> Network analysis -> Network segmentation testing** This configuration setting allows you to define
|
|
|
|
subnets that should be segregated from each other. If any of provided networks can reach each other, you'll see it
|
|
|
|
in security report.
|
2020-08-14 16:03:40 +08:00
|
|
|
- **(Optional) Network -> Scope** You can disable **Local network scan** and leave other options by default if you only want to
|
2020-08-13 21:34:35 +08:00
|
|
|
test for network segmentation without any lateral movement.
|
2020-08-14 16:03:40 +08:00
|
|
|
- **(Optional) Monkey -> Post Breach Actions** If you only want to test segmentation in the network, you can turn off
|
2020-08-13 21:34:35 +08:00
|
|
|
all post breach actions. These actions simulate attacker's behaviour after getting access to a new system, so they
|
|
|
|
might trigger your defence solutions which will interrupt segmentation test.
|
|
|
|
|
2020-10-23 17:30:38 +08:00
|
|
|
## Suggested run mode
|
|
|
|
|
2020-10-23 22:46:23 +08:00
|
|
|
Execute Monkeys on machines in different subnetworks using the “Manual” run option.
|
2020-08-13 21:34:35 +08:00
|
|
|
|
|
|
|
Note that if Monkey can't communicate to the Island, it will
|
2020-10-23 17:30:38 +08:00
|
|
|
not be able to send scan results, so make sure all machines can reach the island.
|
2020-08-13 21:34:35 +08:00
|
|
|
|
|
|
|
![How to configure network segmentation testing](/images/usage/scenarios/segmentation-config.png "How to configure network segmentation testing")
|
|
|
|
|
|
|
|
|
|
|
|
## Assessing results
|
|
|
|
|
|
|
|
Check infection map and security report for segmentation problems. Ideally, all scanned nodes should only have
|
|
|
|
edges with the Island Server.
|
|
|
|
|
|
|
|
![Map](/images/usage/use-cases/segmentation-map.PNG "Map")
|
|
|
|
|