Network segmentation isolates critical systems
A flat network where every device can reach every other device means that compromising one endpoint can lead to compromising everything. Segmentation limits what an attacker can access after gaining an initial foothold. Production systems should be isolated from office networks. Databases should not be directly reachable from the internet. Critical systems should require explicit access paths, not open internal routing.
Implementation steps
- 1
Separate production from non-production and corporate networks
Production systems should be on a separate network segment, cloud VPC, or account from development, staging, and corporate office networks. Developer laptops should not be able to directly reach production databases. Use cloud account separation to enforce this boundary at the infrastructure level.
aws-vpc aws-organizations cloudflare-access terraform - 2
Restrict internet exposure of internal services
Audit your cloud and on-premises infrastructure for services that are publicly accessible but should not be. Databases, admin panels, internal APIs, and management interfaces should not be reachable from the public internet. Use security groups, firewall rules, and private networking to enforce this.
aws-security-groups aws-vpc cloudflare terraform - 3
Use zero-trust or VPN for remote access to internal systems
Remote access to internal systems and production environments should go through a VPN or zero-trust access solution that enforces identity verification and device health checks. Direct RDP or SSH exposure to the internet is a critical vulnerability. Require VPN or ZTNA for all remote administrative access.
cloudflare-access tailscale zscaler cisco-duo
Evidence required
Network segmentation documentation
Evidence that production and sensitive systems are network-isolated.
- - Network diagram showing segment boundaries
- - AWS VPC configuration with separate subnets for prod and dev
- - Security group rules preventing direct internet access to databases
Related controls
An inventory of authorized hardware and software assets is maintained
Device Security
Devices are configured securely with hardened baselines
Device Security
Endpoint detection and response (EDR) is deployed on all managed devices
Device Security
Critical and high CVEs are patched within 14 days; all others within 30 days
Device Security