Q1. PJ, your company is betting on micro-segmentation as the best approach for preventing the spread of breaches inside the cloud and data centers. How is micro-segmentation different from network segmentation? Why doesn't traditional network segmentation work for security?
Traditional network segmentation, well understood by security and infrastructure teams, was designed to subdivide the network into smaller network segments through VLANs, subnets, and zones. Although these constructs can provide some isolation, their primary function is to boost network performance and requires control of the infrastructure, which is often a challenge in the public cloud.
In contrast, micro-segmentation was designed to prevent the spread of breaches and enforce security policies — what should and should not be allowed to communicate among various points on the network.
The goal of micro-segmentation is to decrease the network attack surface. By applying micro-segmentation rules down to the workload or application, IT significantly reduces the risk of an impactful data breach. For example, when a bad actor can only move between three application workloads vs. 3,000, their chances of accessing and stealing critical data without being detected is severely limited. Plus, the smaller attack surface makes it easier and faster for IT to find bad actors once they are in because they cannot move everywhere to hide.
One of the challenges with segmentation is you must know what to segment. Mapping the connections between workloads, applications, and environments requires real-time visibility into application dependencies, which many enterprises lack. Lack of visibility makes it harder to reduce the attack surface, protect applications, and reduce cyber risk. Creating a real-time context-rich application dependency map is the first step towards successful micro-segmentation.
With micro-segmentation, security is decoupled from the underlying network hardware constructs like IP addresses and port numbers. This approach leverages user-defined labels that can be imported from a system of record like vCenter or CMDB to create policies, making it much easier to deploy – while also reducing IT burden and errors. Once defined, the policies follow the workload, making them truly portable and agnostic of the workload form factor (bare-metal server, virtual machine, or container) and location (on-premise, public cloud). The policies are elastic as well, which means any new workloads instantiated in that group will inherit the policy.
Q2. Matthew, you recently noted in a blog that the key to protecting the network is to understand that there is no network. But organizations have cumulatively spent tens of billions of dollars on network security over the years. What's your advice on how best they can continue leveraging that investment while moving to a more workload/application-centric security model?
I think that is the challenge many people face when they think about micro-segmentation. The word "segmentation" implies that it is a network-centric challenge when, in reality, if an IT team realizes that they may not own the network — and the network doesn't "bend" so well — it makes organizations bend the way that they think and find better solutions.
I often think in metaphors and when I wrote that I was thinking about the movie "The Matrix," when Neo takes the spoon from the child who is bending it and makes it straight again.
Spoon kid: Do not try and bend the spoon. That's impossible. Instead, only try to realize the truth.
Neo: What truth?
Spoon kid: There is no spoon.
When you don't own the network, then there is no network.
Q3. PJ, help us understand how micro-segmentation can help organizations implement a Zero Trust security strategy?
Micro-segmentation is a key building block of the Zero Trust strategy. It implies a least privilege security model – only allow explicitly specified communications. And while normally we think about this in terms of users and data, which of course is a critical part of Zero Trust, the next step is to apply that same least privilege model to all the applications and workloads in your data center and cloud
To have precise and granular control of communications between workloads, applications, and processes running across the data center or public cloud, one needs a mechanism to easily create micro-perimeters around applications and processes. Micro-segmentation allows you to do precisely that, which is the first step towards restricting all communications unless specifically allowed.
The first thing organizations need to do when adopting a Zero Trust strategy is to have a good real-time view of their application landscape mapping all communications between workloads and application tiers. This is known as application dependency mapping and is a very important step before jumping into actual micro-segmentation. You can't segment what you can't see. A real-time map allows you to create the right policies that reflect the intended security posture.
It is no surprise that micro-segmentation has quickly become part of corporate security strategy. Organizations want to reduce risk in the event of a breach and a Zero Trust strategy enabled by micro-segmentation helps them prevent unauthorized lateral movement. Customers have started to assign budget towards micro-segmentation projects.
Another driver for micro-segmentation is regulatory compliance. The fundamental principle of Zero Trust is reflected in the mandates as part of compliance and auditing. Micro-segmentation helps organizations comply with regulations.
Q4. What are some of the questions you are expecting, or hoping, that attendees at Black Hat Europe will have for Illumio at the event?
Awareness that breaches are inevitable has IT organizations taking a pragmatic look at minimizing their exposure. Based on our experience with the largest micro-segmentation deployments in the world, we expect to have conversations around real-world deployments, operational aspects, and the need to scale.
Micro-segmentation deployments have risen significantly in the last year and the technology has become mainstream with customers like Morgan Stanley, Salesforce, and Oracle NetSuite implementing it globally and at scale. Some of the largest micro-segmentation deployments in the world are using the Illumio Adaptive Security Platform – and have production deployments with tens of thousands of workloads. Many enterprises are looking to scale micro-segmentation beyond their critical applications to include business applications and core services, which demands a level of scale never before envisioned. We had the foresight to think about this early and the Illumio Adaptive Security Platform is built for scale and resiliency.
We are hoping to talk to attendees about their specific use cases, scalability requirements, and operational challenges. Our technical experts thrive on new and interesting challenges presented by attendee scenarios and engage in real-time problem solving on the show floor.