Segmenting for security: Five steps to protect your network

1 2 3 4 5 6 Page 4
Page 4 of 6
build freelance tech worker team teambuilding Thinkstock

* Determine who can access what data. This boils down to business need: who needs to administer the routers or switches? Who needs access to the human resources or financial systems? How many folks should be able to remotely control the security cameras? Be ruthless. If there is no business need, there should be no access.

Organizations that operate entirely on a local or regional domestic level may even want to implement wholesale blocking of remote geographic regions at the IP layer. In general, adopt a default deny access posture for each VLAN. Your goal is to limit access to sensitive information to those who need it within the organization and to create roadblocks to stop or slow intruders, who may have broken through one layer of security, from doing further damage.

1 2 3 4 5 6 Page 4
Page 4 of 6
IT Salary Survey: The results are in