Segregated Network
To secure connectivity Network should be segregated or subnetted with respect to incoming and outgoing access.
As in the house design example above, you have your living room accessible to all incoming people, bedroom is private to you, kitchen is visible to your guests however operated by you. Likewise identify the privacy layers in your network -
Is it Public , allowing ingress traffic from outside, or Private that is no incoming and outgoing internet access or is it Protected by allowing only outgoing access to internet.
Network privacy can be achieved via VPCs and subnets if you are hosted on cloud or through VLAN and DMZs if you are on premise and on legacy systems. You should have VPCs over classic or dynamic network.
Configurations must be logically segregated or tiered with respect to usage (e.g. per product or customer).
Firewall rules must be adapted per tier/subnet.
If necessary segregate virtual machines and appliances to dedicated hardware.
Always keep separate networks for production and non-production.
Last updated
Was this helpful?