当前位置:网站首页>Micro isolation (MSG)
Micro isolation (MSG)
2022-06-13 06:59:00 【PolarDay.】
Micro isolation (MSG)
Reference article : use " Micro isolation " Achieve zero trust
Reference video : Not just firewalls ! Zero trust with micro isolation
Definition
Micro isolation (Micro Segmentation), Micro isolation is a network security technology , Its core capability requirement is to focus on the isolation of East-West flow , It enables the security architect to logically divide the data center into different security segments , All the way to the various workload levels , Then define security controls and services provided for each unique segment .
More software methods , Instead of installing multiple physical firewalls , Micro isolation can deploy flexible security policies deep in the data center .
Data flow
North South flow : Refers to the traffic entering and leaving the data center through the gateway , Generally speaking, the firewall is deployed at the exit of the data center , To protect the north-south flow
East West flow : It refers to the internal traffic caused by the mutual access of servers in the data center , According to statistics , Contemporary data centers 75% The above flow is East-West flow
form
Different from the traditional firewall isolation on the single point boundary ( Both the control platform and the isolation policy execution unit are coupled in a device system ), The control center platform and policy execution unit of micro isolation system are separated , Distributed and adaptive :
Strategic Control Center : It's the central brain of the micro isolation system , You need to have the following key abilities
- It can visualize the access relationship between internal systems and business applications , The platform users can quickly sort out the internal access relationship ;
- According to the role 、 Multi dimensional tags such as business functions quickly group workloads that need to be isolated ;
- The ability to flexibly configure the workload 、 Isolation strategy between business applications , Policies can be configured and migrated adaptively according to the working group and workload .
Policy execution unit : The unit of work that implements traffic data monitoring and isolation policies , It can be a virtualization device or a host Agent.
Implementation method
1、 be based on agent The client implements micro isolation
This mode requires one on each server's operating system agent.Agent Call the host's own firewall or kernel custom firewall to control the access between servers .
The Red Square on the right is the management platform , Responsible for developing strategies , To collect information .
advantage : It has nothing to do with the bottom , Support containers , Support cloudy .
shortcoming : Must be installed on each server agent client . Some people worry about resource occupation , Worry about affecting existing business .
2、 Realize micro isolation based on cloud native capabilities
Use the firewall function of the virtualization device in the cloud platform infrastructure for access control .
advantage : The isolation function and infrastructure are provided by the cloud , So the compatibility between the two is better , The operation interface is similar .
shortcoming : It is impossible to conduct unified management and control across multiple cloud environments .
3、 Micro isolation based on third-party firewall
Use the existing firewall for access control .
advantage : Network personnel are familiar with , There is intrusion detection 、 Anti virus and other functions .
shortcoming : The firewall itself runs on the server , Lack of control over the underlying .
Ability
- Business flow is fine-grained and visible : Main engine room 、 The traffic between business systems is visible
- Reduce internal attack surface : Reduce the exposure of internal interface permissions , Reduce the attack area
- Business based policy creation : Eliminate network structure , To improve the policy creation process
- Divide isolation domains flexibly : Configure environment isolation 、 Business isolation 、 End to end isolation strategy
- Centralized visual management of security policies : Realize the matching of security policy and workflow through the management interface
advantage
- Policy model : Business oriented fine-grained definition of East-West boundaries
- Strategy execution : Automation adapts to business changes rather than manual static configuration
- Strategic management : From decentralized management to centralized management
Implementation steps
- Defining assets : assets ( service 、 Business, etc ) grouping ; Group logically
- Sort out the business model : Service security domain identification ; Network traffic self-learning 、 Self discovery 、 Self describing service security domain
- Design micro isolation grouping : Security policy group 、 System security domain 、 Tenant security domain 、 Business security domain
- Implement protection : Execute the block according to the policy 、 release ; Add a new load and add a domain automatically
- Continuous monitoring : Quickly discover internal penetration 、 Traverse 、 scanning 、 Extortion, virus spreading, etc ; Block log 、 Abnormal behavior alarm
边栏推荐
- Test development programmers, are you still confused? You can't define yourself as a yard farmer
- When the concept of industrial Internet just appeared, people only regarded it as a method to obtain b-end traffic
- Socket programming server and client (multiple clients can connect to the same port of a server at the same time)
- Is it safe to open an account online in Hangzhou?
- June 12, 2022: if there are n*n pieces in an n*n square chessboard, each grid can have exactly one piece. But now some pieces are gathered on a grid, such as 2030100300. The above two-dimensional arra
- 【腾讯阿里最全面试题集锦】(四面:3轮技术+1轮HR)
- Periodontitis investigation (ongoing)
- 杭州网上开户是安全的吗?
- YOLOv5解析 | 参数与性能指标
- Is it safe for Hangzhou Securities to open an account?
猜你喜欢

The causes of font and style enlargement when the applet is horizontal have been solved

10 Honest Facts I Want To Share With All Junior Developers

在 localStorage 中上传和检索存储图像

牙周炎问题调研(持续进行中)

Tidb grafana reverse proxy

Normalizing y-axis in histograms in R ggplot to proportion

In the era of membership based social e-commerce, how do businesses build their own private domain traffic pool?

不间断管理设计

2022-06-12:在N*N的正方形棋盘中,有N*N个棋子,那么每个格子正好可以拥有一个棋子。 但是现在有些棋子聚集到一个格子上了,比如: 2 0 3 0 1 0 3 0 0 如上的二维数组代表,一

Br backup test
随机推荐
Tikv key performance parameters and optimization
Network planning common interview knowledge (I)
【腾讯阿里最全面试题集锦】(四面:3轮技术+1轮HR)
Cocos creator compilation game cannot read property 'polygonpolygon' of undefined
Br backup test
MongoDB系列之SQL和NoSQL的区别
[RS-422 and RS-485] RS-422 and RS-485 serial interface standard
NFV基本概述
[turn to] FPGA interview questions
The innovative public platoon mode team invites users to split, beautiful every second, and links the 2+1 new business model
2022-06-12:在N*N的正方形棋盘中,有N*N个棋子,那么每个格子正好可以拥有一个棋子。 但是现在有些棋子聚集到一个格子上了,比如: 2 0 3 0 1 0 3 0 0 如上的二维数组代表,一
Jinglianwen Technology: current situation and solutions of data acquisition and labeling industry
同花顺可以开股票账户吗?安全吗?
智能金融再升级,景联文科技提供数据采集标注服务
【RS-422与RS-485】RS-422与RS-485串行接口标准
不间断管理设计
How to make a development board from scratch? Illustrated and illustrated, step by step operation for you to see.
Uploading and retrieving stored images in localstorage
New Taishan crowdfunding business diversion fission growth model in 2022
WWDC2022最大的亮点: MetalFX