Networking & CommunicationsNetwork Security

Network Segmentation

Overview

Direct Answer

Network segmentation is the architectural practice of dividing a single network into isolated logical or physical subnetworks, each functioning as its own perimeter. This isolation restricts lateral movement of threats and enables granular access control policies tailored to distinct organisational requirements.

How It Works

Segmentation is enforced through VLANs, firewalls, microsegmentation policies, or dedicated physical switches that enforce traffic rules between zones. Each segment operates with its own routing policies and security controls; traffic crossing segment boundaries is inspected and filtered according to predetermined allow/deny rules, preventing unauthorised lateral propagation.

Why It Matters

Organisations adopt segmentation to contain security breaches, reduce compliance audit scope, optimise bandwidth allocation for critical systems, and minimise blast radius when systems are compromised. Regulatory frameworks in healthcare, finance, and critical infrastructure increasingly mandate segmentation as a foundational security control.

Common Applications

Healthcare networks isolate patient records (PHI) from administrative systems; financial institutions separate customer-facing services from back-office infrastructure; manufacturing environments segregate operational technology (OT) from corporate IT networks to prevent production disruptions from cyber incidents.

Key Considerations

Segmentation increases operational complexity through management overhead and can introduce latency if poorly designed. Balancing security rigour with legitimate inter-system communication remains a persistent implementation challenge.

Cross-References(1)

Networking & Communications

More in Networking & Communications