Network Segmentation
ELI5 — The Vibe Check
Network Segmentation divides your network into isolated zones. The web servers can't talk to the database directly. The dev environment can't reach production. If an attacker compromises one zone, they're stuck there. It's like watertight compartments on a ship — one leak doesn't sink everything.
Real Talk
Network segmentation divides a network into isolated zones with controlled traffic flow between them using firewalls, VLANs, subnets, and security groups. It limits lateral movement during breaches, enforces compliance boundaries, and reduces blast radius of compromised systems.
When You'll Hear This
"Network segmentation prevents the frontend tier from directly accessing the database tier." / "After the breach, segmentation contained the attacker to the compromised subnet."
Related Terms
Defense in Depth
Defense in Depth means layering multiple security measures so if one fails, others catch the threat.
Firewall
A firewall is the bouncer at your network's door. It checks every incoming and outgoing connection against a list of rules and blocks anything suspicious.
Microsegmentation
Microsegmentation is network segmentation dialed up to 11. Instead of segmenting by subnet, you create rules for EVERY workload.
Zero Trust
Zero Trust means 'never trust, always verify.' Even if you're inside the company network, you still have to prove who you are for every request.