Loading
Blog
Recent ActivityRecent Activity

Restrict and Contain Security Threats With Network Segmentation

Share This:

LinkedInLinkedIn
XX
FacebookFacebook
PrintPrint
EmailEmail
Restrict and Contain Security Threats With Network Segmentation hero image

An open and unsegmented network is a gift to cyber attackers.

Once an attacker finds and exploits the most vulnerable point of entry, it could turn into a potential "kid-in-a-candy-shop" scenario. They may be able to pivot to more easily access a larger part of the network and potentially anything connected to it – from product designs or recipes, to machine controls, to company finances.

And it’s not only external threats that pose a danger on an unsegmented network. Internal threats, whether it’s a disgruntled employee or human error like an incorrect system change, also can wreak havoc when there are no network boundaries or access limitations.

This is why network segmentation should be part of every company’s industrial security strategy.

Network segmentation separates your network into multiple smaller networks and allows you to establish zones of trust. This can help limit the access of outside security threats and contain any damage they cause.

And it can help give employees and business partners access to only the data, assets or applications that they need.

Levels of Segmentation

Virtual LANs or VLANs are most commonly associated with network segmentation. These are broadcast domains that exist within a switched network. They allow you to segment your network logically – such as by function, application or organization – instead of physically.

VLANs can secure devices and data in two ways. First, you can block devices in certain VLANs from communicating with devices in other VLANs. Second, you can use a Layer-3 switch or router with security and filtering functionality to help to protect the communications of devices that do talk to each other across VLANs.

But while VLANs are an important part of segmentation, they’re only one solution. You should also use other segmentation methods across different levels of your network architecture.

One example is the use of an industrial demilitarized zone (IDMZ). It creates a barrier between the enterprise and manufacturing or industrial zones. All traffic between the two zones terminates at this barrier, while still allowing data to be securely shared.

Other segmentation methods to consider using include access control lists (ACLs), firewalls, virtual private networks (VPNs), one-way traffic restrictors, and intrusion protection and detection services (IPS/IDS).

Think Holistically

When implementing network segmentation, consider how it will be applied across your entire organization.

Some companies create purpose-built firewalls at individual facilities. But this can lead to “islands” of security. Different sites will have different firewalls, making it difficult to deploy them in a consistent manner or centrally manage them.

It’s also important to think about segmentation within your company’s long-term needs.

Purpose-built security solutions are too often rigid – they may meet your needs today but can’t flex or evolve with your business to meet tomorrow’s operating or security needs. Purpose-built solutions also tend to rely on the expertise of a small number of employees. And those employees can take vital security or maintenance knowledge with them if they leave.

The solutions you use to implement network segmentation should be flexible enough to grow with your operations. And they should be standardized so the appropriate worker(s) at any site can use and maintain them.

Help is Available

Network segmentation is a well-known IT concept, but it’s still taking hold in the industrial world. The industrial companies that are implementing it are discovering the challenges that come with applying it across an entire Connected Enterprise, like managing segmented data and scaling it to grow with production operations.

If you’re unsure of where to begin or what segmentation method to deploy, freely available resources can help.

The Converged Plantwide Ethernet (CPwE) design guides are a good place to start. Guides on topics like IDMZs, industrial firewalls and networking considerations can help you deploy segmentation using the latest technologies and industry best practices.

The guides are jointly developed and tested by Rockwell Automation and Cisco, and build a foundation to other collaborative products and services to help you segment and secure your network. We also offer training, network and security services, and technologies.

Some of our segmentation technologies – like the Stratix® 5950 security appliance – will be on display at Hannover Messe 2018. If you’re attending the show, come see us at Cisco booth #G30 in Hall 6.

Published April 4, 2018


Josh Kass
Josh Kass
Product Manager, Network Security & Wireless, Rockwell Automation
Connect:
EmailEmail
Subscribe

Subscribe to Rockwell Automation and receive the latest news, thought leadership and information directly to your inbox.

Subscribe

Recommended For You

Loading
  1. Chevron LeftChevron Left United Kingdom Chevron RightChevron Right
  2. Chevron LeftChevron Left Company Chevron RightChevron Right
  3. Chevron LeftChevron Left News Chevron RightChevron Right
  4. Chevron LeftChevron Left Blogs Chevron RightChevron Right
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our {0} Privacy Policy
CloseClose