Increasing segmentation allows for segments that represent services, where each segment includes the servers necessary for that service to function. Communication within the segment is permitted, but access in and out is controlled by the firewall.
Another approach is to segment based on function, clustering web applications with other web applications in one segment, databases in another, and different services in their respective segments.
The most secure segmentation method is zero-trust architecture, which mandates explicit permission for all systems to communicate with different services. Linking firewall management to the organization’s user directory allows administrators to create role-based rules, enabling seamless permission adjustments without needing to request changes from firewall administrators when roles change, known as user-based policy control.
Note: A commonly used user directory is Microsoft’s Windows Active Directory, which contains information about the organization’s users, computers, and groupings. |