Microsegmentation
Microsegmentation is a security technique that divides a network into very small, isolated segments, each with its own security controls. This limits an attacker's ability to move freely within a network after gaining initial access, because each segment acts as its own secure zone. It is commonly used in data centers, cloud environments, and hybrid infrastructure to reduce the impact of a breach.
Microsegmentation is a network security architecture that establishes fine-grained security zone boundaries at the level of individual workloads, applications, or services rather than at the traditional network perimeter or subnet level. Security policies are enforced per segment and may operate at Layer 3/Layer 4 (IP addresses, ports, protocols), at Layer 7 (application-level identity and context), or across multiple layers depending on the implementation. By restricting lateral (east-west) traffic between workloads, microsegmentation reduces the blast radius of a compromise and supports zero trust principles. Implementations typically rely on software-defined networking, host-based agents, or hypervisor-level controls to enforce policies without requiring changes to physical network topology. Practitioners should note that overly restrictive or misconfigured policies can produce false-positive blocking of legitimate traffic, while overly permissive rules or incomplete policy coverage across all workload communication paths may result in false-negative gaps that allow unauthorized lateral movement. Operational overhead, including the complexity of defining, maintaining, and auditing granular policies at scale, is a recognized challenge in production deployments.
Why it matters
Traditional network security architectures typically enforce controls at the perimeter or subnet level, leaving internal (east-west) traffic between workloads largely unmonitored. Once an attacker breaches the perimeter, this flat internal topology allows relatively unrestricted lateral movement, enabling the compromise of additional systems, escalation of privileges, and exfiltration of sensitive data. Microsegmentation directly addresses this gap by creating fine-grained security boundaries around individual workloads, applications, or services, significantly reducing the blast radius of any single compromise.
Microsegmentation is a foundational component of zero trust architectures, which operate on the principle that no network traffic should be implicitly trusted regardless of its origin. In modern data center, cloud, and hybrid environments where workloads are dynamic and frequently provisioned or decommissioned, traditional perimeter-based controls are insufficient. Microsegmentation provides the granular, policy-driven enforcement needed to maintain security posture in these environments.
The technique is particularly important for organizations subject to regulatory requirements that mandate strong internal access controls and network segmentation, such as PCI DSS. By limiting communication paths between workloads to only what is explicitly authorized, microsegmentation reduces both the attack surface available to adversaries and the scope of systems that may need to be included in compliance assessments.
Who it's relevant to
Inside Microsegmentation
Common questions
Answers to the questions practitioners most commonly ask about Microsegmentation.