From the course: Modern Cloud Security: Shift-Left, Observability, and Automated Defense
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Network segmentation and isolation techniques
From the course: Modern Cloud Security: Shift-Left, Observability, and Automated Defense
Network segmentation and isolation techniques
- [Instructor] Alice sat at her desk staring at the incident report. A ransomware attack had hit Red30 Tech cloud environment. The malware spread from a compromised IoT device in the patient monitoring system to the billing database, encrypting everything. The root cause, flat network architecture, everything connected, no barriers. In cybersecurity, network segmentation is like building firebreaks in a forest. If a fire starts, it burns one section, but not the whole ecosystem. For Alice's company, this meant splitting their cloud network into isolated zones, dev, prod, IoT, and third-party vendor access. Alice started by logging into the AWS Management Console. Her goal was clear, transform Red30 Tech flat, vulnerable network into a segmented fortress. She opened the VPC dashboard and navigated to her existing virtual private cloud. The first step was carving the VPC into smaller, isolated neighborhoods, subnets. She clicked Create subnet and defined three subnets. Public subnet for…
Contents
-
-
-
-
-
-
(Locked)
Configure virtual private clouds3m 40s
-
(Locked)
Network segmentation and isolation techniques4m 50s
-
(Locked)
Setting up security groups and firewall rules2m 49s
-
(Locked)
Implement intrusion detection and prevention systems3m 38s
-
Utilize security information and event management tools2m 53s
-
(Locked)
Establishing VPNs and secure connections5m 18s
-
(Locked)
Explore Direct Connect and ExpressRoute options3m 24s
-
(Locked)
Secure hybrid cloud connectivity4m 35s
-
(Locked)
-
-
-
-
-