From the course: Modern Cloud Security: Shift-Left, Observability, and Automated Defense

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Network segmentation and isolation techniques

Network segmentation and isolation techniques

- [Instructor] Alice sat at her desk staring at the incident report. A ransomware attack had hit Red30 Tech cloud environment. The malware spread from a compromised IoT device in the patient monitoring system to the billing database, encrypting everything. The root cause, flat network architecture, everything connected, no barriers. In cybersecurity, network segmentation is like building firebreaks in a forest. If a fire starts, it burns one section, but not the whole ecosystem. For Alice's company, this meant splitting their cloud network into isolated zones, dev, prod, IoT, and third-party vendor access. Alice started by logging into the AWS Management Console. Her goal was clear, transform Red30 Tech flat, vulnerable network into a segmented fortress. She opened the VPC dashboard and navigated to her existing virtual private cloud. The first step was carving the VPC into smaller, isolated neighborhoods, subnets. She clicked Create subnet and defined three subnets. Public subnet for…

Contents