Few Firms Use Segmentation, Despite Security Benefits

  /     /     /  
Publicated : 23/11/2024   Category : security


Few Firms Use Segmentation, Despite Security Benefits


Network segmentation is considered a key security control to prevent attackers from easily accessing critical assets from compromised, but unprivileged, computers. So why arent more companies doing it?



Fewer than one in five companies is currently using network segmentation to slow intruders from moving around its network, mainly due to the difficulty of configuring and maintaining firewall rules, according to a survey conducted by network security provider Illumio.
The survey, based on interviews with 300 IT professionals, found that 19% of companies currently use network segmentation to reduce the risk of a data breach, while another 26% are planning a project in the next six months. Yet a whopping 55% of companies are not even considering deploying segmentation in that time frame, according to the survey. 
The responses suggest that companies understand the benefits of segmenting their applications and servers, but the difficulty of the project has dissuaded many IT professionals, causing them to put off efforts, says Matt Glenn, vice president of product management for Illumio.
When we talked to people, they never say that they dont want to do segmentation, he says. They ask how can they do it and what is the cost.
Network segmentation is one way of dispensing with trust and
minimizing the impact that a user could have on the network
. A variety of companies have touted the zero-trust model for security, labeling trust as weakness. By limiting access to specific critical assets and data, segmentation is one way of implementing zero-trust security and can harden networks against an intruders efforts to laterally move after a breach. 
Last year, network segmentation appeared on the to-do lists of nine out of 10 companies,
according to a blog post from network security firm Forescout
. Illumios survey suggests that companies still have to work to do, however. Thats understandable, as network segmentation projects take a great deal of time and planning. Moreover, companies need to do it right — if done incorrectly, segmentation can create roadblocks for legitimate users. 
Because of these difficulties, two-thirds of respondents considered the process of segmenting using firewalls to be fairly challenging or even more difficult,
the survey found
.
Among their most pressing concerns were cost, troubleshooting, deployment and making changes, Illumio stated in the report. The difficulties respondents had with their firewalls ranged from deployment to obtaining budgets, implementing changes and verifying them.
Most companies have to deal with a large number of firewall rules. Almost two-thirds — 62% — of organizations have more than 1,000 rules per firewall, according to the survey.
Using firewalls as the basis of network segmentation can slow down the deployment of new rules for applications, the company says. The average time to deploy and tune a firewall is one to three months, and it takes an average of one to two weeks to accommodate a new application, according to the survey. Such delays make segmentation via the firewall not friendly to software development life cycles focused on DevOps, Glenn says.
Most people when they think about doing segmentation, they are thinking about doing it with a firewall, and that its like trying to put together Ikea furniture with a hammer, he says. Its not going to work, but you only have one tool, so you use it, even if it is not the right one.
As agile development and techniques such as DevOps grow in popularity, companies are searching for methods of making security more responsive to application configuration. Software-defined networking has become one way that companies can quickly segment networks as well as add responsive security features, such as
deceptive network architectures that can waste attackers time
.
Other companies — such as Cisco, Illumio, and VMware — focus on host-based segmentation, using the firewall of the applications host to enforce security segmentation on the application.
In the end, companies need to find ways to more granularly apply security policies to assets on their network, according to analyst firm Forrester Research.
Defending the perimeter is no longer an effective strategy, the firm
states on its Zero Trust site
. Zero Trust implements methods to localize and isolate threats through microcore, microsegmentation, and deep visibility to give you an organized approach to identify threats and limit the impact of any breach.
 
Related Content:
How Data Breaches Affect the Enterprise
A Beginners Guide to Microsegmentation
Segmentation: The Neglected (Yet Essential) Control
What You Need to Know About Zero Trust Security
Segmentation: A Fire Code For Network Security
 
Check out The Edge, Dark Readings new section for features, threat data, and in-depth perspectives. Todays top story: 
How to Manage API Security
.

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Few Firms Use Segmentation, Despite Security Benefits