当前位置:网站首页>Micro isolation (MSG)
Micro isolation (MSG)
2022-06-13 06:59:00 【PolarDay.】
Micro isolation (MSG)
Reference article : use " Micro isolation " Achieve zero trust
Reference video : Not just firewalls ! Zero trust with micro isolation
Definition
Micro isolation (Micro Segmentation), Micro isolation is a network security technology , Its core capability requirement is to focus on the isolation of East-West flow , It enables the security architect to logically divide the data center into different security segments , All the way to the various workload levels , Then define security controls and services provided for each unique segment .
More software methods , Instead of installing multiple physical firewalls , Micro isolation can deploy flexible security policies deep in the data center .
Data flow
North South flow : Refers to the traffic entering and leaving the data center through the gateway , Generally speaking, the firewall is deployed at the exit of the data center , To protect the north-south flow
East West flow : It refers to the internal traffic caused by the mutual access of servers in the data center , According to statistics , Contemporary data centers 75% The above flow is East-West flow
form
Different from the traditional firewall isolation on the single point boundary ( Both the control platform and the isolation policy execution unit are coupled in a device system ), The control center platform and policy execution unit of micro isolation system are separated , Distributed and adaptive :
Strategic Control Center : It's the central brain of the micro isolation system , You need to have the following key abilities
- It can visualize the access relationship between internal systems and business applications , The platform users can quickly sort out the internal access relationship ;
- According to the role 、 Multi dimensional tags such as business functions quickly group workloads that need to be isolated ;
- The ability to flexibly configure the workload 、 Isolation strategy between business applications , Policies can be configured and migrated adaptively according to the working group and workload .
Policy execution unit : The unit of work that implements traffic data monitoring and isolation policies , It can be a virtualization device or a host Agent.
Implementation method
1、 be based on agent The client implements micro isolation
This mode requires one on each server's operating system agent.Agent Call the host's own firewall or kernel custom firewall to control the access between servers .
The Red Square on the right is the management platform , Responsible for developing strategies , To collect information .
advantage : It has nothing to do with the bottom , Support containers , Support cloudy .
shortcoming : Must be installed on each server agent client . Some people worry about resource occupation , Worry about affecting existing business .
2、 Realize micro isolation based on cloud native capabilities
Use the firewall function of the virtualization device in the cloud platform infrastructure for access control .
advantage : The isolation function and infrastructure are provided by the cloud , So the compatibility between the two is better , The operation interface is similar .
shortcoming : It is impossible to conduct unified management and control across multiple cloud environments .
3、 Micro isolation based on third-party firewall
Use the existing firewall for access control .
advantage : Network personnel are familiar with , There is intrusion detection 、 Anti virus and other functions .
shortcoming : The firewall itself runs on the server , Lack of control over the underlying .
Ability
- Business flow is fine-grained and visible : Main engine room 、 The traffic between business systems is visible
- Reduce internal attack surface : Reduce the exposure of internal interface permissions , Reduce the attack area
- Business based policy creation : Eliminate network structure , To improve the policy creation process
- Divide isolation domains flexibly : Configure environment isolation 、 Business isolation 、 End to end isolation strategy
- Centralized visual management of security policies : Realize the matching of security policy and workflow through the management interface
advantage
- Policy model : Business oriented fine-grained definition of East-West boundaries
- Strategy execution : Automation adapts to business changes rather than manual static configuration
- Strategic management : From decentralized management to centralized management
Implementation steps
- Defining assets : assets ( service 、 Business, etc ) grouping ; Group logically
- Sort out the business model : Service security domain identification ; Network traffic self-learning 、 Self discovery 、 Self describing service security domain
- Design micro isolation grouping : Security policy group 、 System security domain 、 Tenant security domain 、 Business security domain
- Implement protection : Execute the block according to the policy 、 release ; Add a new load and add a domain automatically
- Continuous monitoring : Quickly discover internal penetration 、 Traverse 、 scanning 、 Extortion, virus spreading, etc ; Block log 、 Abnormal behavior alarm
边栏推荐
- The innovative public platoon mode team invites users to split, beautiful every second, and links the 2+1 new business model
- RT-Thread 模拟器 simulator LVGL控件:slider 控件
- Ffmpeg compressed video.
- Intelligent entertainment has developed steadily, and jinglianwen technology provides data collection and labeling services
- IIS batch bind domain name
- Unable to find method 'org gradle. api. artifacts. result. ComponentSelectionReason. getDesc
- 上位机开发(固件下载软件之架构设计)
- Tidb statistics
- Cocos released the oppo game prompt "subcontracting failed"
- Can flush open a stock account? Is it safe?
猜你喜欢
Chain 2+1 reward, what kind of mode is beautiful everyday seconds?
怎么写出一份令人惊叹的设计文档?
测试开发程序员,你还在迷茫吗?不能把自己定义为码农......
髋关节MR详细图谱(转载)
Lightning breakpoint continuation
105. 从前序与中序遍历序列构造二叉树
尝试使用RenderDoc查看UE的Shader代码
Analyzing server problems using jvisualvm
Why is the new e-commerce outlet mode so popular? What is the specific mode?
Byte (nine)
随机推荐
Tidb index optimization
Gold jewelry enterprise operation mode, beautiful tiantians business solution
【云原生 | Kubernetes篇】Kubernetes 配置
2022 - 06 - 12: dans un échiquier carré n * N, il y a n * n pièces, donc chaque pièce peut avoir exactement une pièce. Mais maintenant quelques pièces sont rassemblées sur une grille, par exemple: 2 0
June 12, 2022: if there are n*n pieces in an n*n square chessboard, each grid can have exactly one piece. But now some pieces are gathered on a grid, such as 2030100300. The above two-dimensional arra
Cocos released the oppo game prompt "subcontracting failed"
通过函数seaborn.cubehelix_palette生成顺序调色板
2022-06-12:在N*N的正方形棋盤中,有N*N個棋子,那麼每個格子正好可以擁有一個棋子。 但是現在有些棋子聚集到一個格子上了,比如: 2 0 3 0 1 0 3 0 0 如上的二維數組代錶,一
[cloud native | kubernetes] kubernetes configuration
Analyzing server problems using jvisualvm
数字时代进化论
Project analysis of Taishan crowdfunding mode: why is Taishan crowdfunding mode so popular?
Network planning common interview knowledge (I)
如何使用望友DFM軟件進行冷板分析
An article allows you to quickly understand the fission growth password of social e-commerce user marketing and avoid stepping on the pit
Brief introduction to basic usage of echart
Application of DS18B20 temperature sensor based on FPGA
New Taishan crowdfunding business diversion fission growth model in 2022
FSM state machine
10 Honest Facts I Want To Share With All Junior Developers