76%
of ransomware incidents involve lateral movement through flat networks
40x
reduction in breach blast radius reported by organizations with mature microsegmentation
2-3 years
typical enterprise microsegmentation implementation timeline
87%
of organizations cite east-west traffic visibility as the primary barrier to microsegmentation

The flat network — where any device can reach any other device on the same subnet or within the same perimeter — is the single architectural decision that most enables ransomware's destructive potential. A threat actor who compromises one workstation on a flat network can reach every file server, database, domain controller, and backup system without crossing a security boundary. Microsegmentation is the systematic process of replacing this flat architecture with policy-driven controls that restrict east-west (lateral) traffic to only what is operationally required. This guide covers how to implement microsegmentation in practice, including the visibility-before-enforcement approach that prevents outages.

Why East-West Traffic Is the Problem

Traditional network security concentrated on north-south traffic — traffic entering and leaving the network through the perimeter. Firewalls, IPS, and web proxies inspect and control this perimeter traffic. But the SolarWinds breach, NotPetya, and virtually every enterprise ransomware incident of the past decade propagated through east-west traffic — lateral movement between internal systems that crossed no perimeter control.

Perimeter controls miss internal traffic

A north-south firewall does not inspect traffic between two workstations on the same subnet. An attacker who establishes a foothold inside the perimeter can move laterally using SMB, WMI, RDP, and other protocols that are implicitly trusted inside the network.

Blast radius of flat networks

In a flat network, a single compromised credential can reach every SMB share, every domain controller, and every backup server. NotPetya spread from initial infection to complete network encryption in minutes on flat enterprise networks — there were no internal security boundaries to slow it.

Zero trust requires east-west control

NIST SP 800-207 (Zero Trust Architecture) requires that every access request be authenticated and authorized regardless of network location. Microsegmentation is the network implementation of this principle — it removes the implicit trust that being on the internal network confers.

Microsegmentation Technologies

Multiple technologies implement microsegmentation with different trade-offs in coverage, complexity, and granularity.

VLAN-based segmentation

The traditional approach: separate workloads into different VLANs with inter-VLAN routing controlled by firewall ACLs. Provides coarse-grained segmentation at the network level. Advantages: supported by any network infrastructure, no new tooling. Limitations: VLANs are network-level constructs that do not follow workloads in cloud or container environments; managing hundreds of VLAN ACL rules becomes complex at scale.

Software-Defined Networking (SDN)

SDN platforms (VMware NSX, Cisco ACI, Juniper Contrail) implement microsegmentation in software overlays. NSX implements distributed firewall rules at each hypervisor, enforcing east-west policy at the vNIC of every VM. This provides consistent enforcement regardless of physical network topology and follows workloads during vMotion. Best for VMware-heavy virtualized environments.

Host-based firewall (agent-based microsegmentation)

Platforms like Illumio, Guardicore (Akamai), and ColorTokens deploy lightweight agents on each workstation and server. Agents enforce firewall rules at the host level and report all communication flows to a central controller. The controller builds a traffic map and generates policy recommendations. Works across bare metal, virtual, and cloud workloads. Most flexible; requires agent deployment across entire fleet.

Cloud-native security groups

AWS Security Groups, Azure NSGs, and GCP VPC Firewall Rules provide workload-level microsegmentation in cloud environments. Each workload (EC2 instance, Azure VM, GCP instance) has associated security group rules controlling allowed ingress and egress. The challenge: default posture is often too permissive, and security groups are not correlated across accounts or subscriptions without additional tooling.

Kubernetes Network Policies

For containerized workloads, Kubernetes NetworkPolicy resources implement pod-level microsegmentation enforced by the CNI plugin. See the Kubernetes security hardening guide for implementation details. Container microsegmentation requires a separate policy approach from VM/bare-metal segmentation.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

The Visibility-First Implementation Approach

The most common microsegmentation failure mode is deploying policy before understanding traffic flows, blocking legitimate communications, and causing outages that create organizational resistance to the initiative. The correct approach is visibility first: understand the actual east-west traffic map before writing a single enforcement rule.

Phase 1 — Traffic visibility (months 1-3)

Deploy monitoring in discovery mode: NetFlow collection, agent-based traffic observation (Illumio, Guardicore), or SDN traffic analysis. Build a complete map of east-west communication flows: which workloads communicate, on which ports and protocols, and how frequently. This baseline becomes the foundation for segmentation policy.

Phase 2 — Asset classification and segmentation design (months 3-6)

Group workloads into segmentation zones based on function and sensitivity: Domain Controllers (Tier 0), critical servers (Tier 1), development environments, user workstations, IoT/OT devices. Design the allowed communication matrix between zones: workstations can reach the web proxy and file servers but not database servers; database servers can only receive connections from their associated application servers.

Phase 3 — Policy simulation (months 6-9)

Implement policies in simulation/test mode. The policy engine shows what would have been blocked without actually blocking. Validate simulated policy against the observed traffic map: identify legitimate traffic that the policy would block, adjust policy, and repeat until simulated block rate for legitimate traffic approaches zero.

Phase 4 — Phased enforcement (months 9-18)

Enable enforcement zone by zone, starting with the highest-risk east-west paths: prevent workstations from making SMB connections to domain controllers, prevent workstations from making RDP connections to servers. Move from coarse zone-to-zone policies toward finer-grained application-level policies as confidence in the traffic map grows.

Phase 5 — Default-deny (months 18-24+)

The mature end state: a default-deny east-west posture where only explicitly allowed communications are permitted. Reach this state incrementally. Attempting to jump to default-deny without the preceding phases reliably produces outages.

High-Value Segmentation Wins: Where to Start

Not all east-west segmentation has equal security value. Prioritize the segments that most directly reduce ransomware blast radius and lateral movement risk.

Isolate Domain Controllers

Domain Controllers should only accept traffic from systems with administrative need. Block workstation-to-DC communication for everything except Kerberos (88), LDAP (389/636), and DNS (53). Prevent workstations from making SMB (445) connections to DCs — SMB to DCs is the primary vector for credential-based lateral movement to the domain tier.

Isolate backup infrastructure

Backup servers are the highest-priority ransomware target after domain controllers. A flat network allows ransomware to reach backup servers directly from compromised workstations. Segment backup servers into a dedicated zone accessible only from a backup management system via a limited management protocol. Block all user workstation access to backup infrastructure.

Workstation-to-workstation blocking

Legitimate enterprise operations rarely require direct workstation-to-workstation communication. Blocking SMB (445), WMI (135/dynamic), and RDP (3389) between workstations eliminates the most common lateral movement protocols. This single rule stops SMB worm propagation — the mechanism that made NotPetya and WannaCry so destructive.

Production vs. development isolation

Development environments should not have network access to production systems. Developers who inadvertently introduce malware in development environments should not be able to propagate it to production. This boundary also reduces the risk of credential reuse attacks across environments.

Microsegmentation Vendors

The microsegmentation market has specialized vendors alongside network and cloud platform offerings.

Illumio

Agent-based microsegmentation platform with strong workload visibility, policy modeling, and enforcement across on-premises and cloud environments. Illumio's traffic map visualization is particularly useful for the discovery phase. Well-regarded for large enterprise deployments and consistent enforcement across heterogeneous environments.

Akamai Guardicore (formerly Guardicore)

Agent-based microsegmentation with strong detection capabilities alongside segmentation — Guardicore includes network anomaly detection and is often used for both lateral movement control and threat detection. Good integration with SIEM platforms.

VMware NSX

SDN-based microsegmentation deeply integrated with VMware vSphere. Distributed firewall rules enforced at the vNIC of each VM; consistent policy across the VMware estate. Ideal for VMware-heavy environments; not applicable to physical systems or public cloud VMs outside of VMware Cloud.

Cisco Secure Workload (formerly Tetration)

Agent-based platform from Cisco with strong application dependency mapping. Well-integrated with Cisco infrastructure. Enterprise-grade deployment complexity; strongest in Cisco-centric environments.

The bottom line

Microsegmentation is a multi-year initiative, not a product deployment. The visibility-first approach — map before enforcing — is not optional; it is the mechanism that prevents outages and builds the organizational confidence required to reach default-deny. Start with the highest-value wins (DC isolation, backup isolation, workstation-to-workstation blocking) and expand from there. Organizations that achieve mature microsegmentation convert ransomware incidents from network-wide disasters into contained single-host events.

Frequently asked questions

What is microsegmentation?

Microsegmentation is the practice of dividing a network into small, policy-controlled zones and restricting traffic between those zones to only what is operationally necessary. Unlike traditional perimeter firewalls that control north-south (inbound/outbound) traffic, microsegmentation controls east-west (lateral) traffic between internal workloads. The goal is to prevent an attacker who compromises one system from freely moving to other systems on the same network.

How does microsegmentation prevent ransomware?

Ransomware that encrypts one workstation causes limited damage. Ransomware that propagates laterally to file servers, domain controllers, and backup systems causes catastrophic damage. Microsegmentation prevents this propagation by blocking the lateral movement protocols (SMB, RDP, WMI) that ransomware uses between workstations and servers. Workstation-to-workstation SMB blocking alone would have prevented NotPetya and WannaCry from propagating past initially infected systems.

What is the difference between network segmentation and microsegmentation?

Traditional network segmentation creates coarse boundaries between large network zones (user network, server network, DMZ) using VLANs and perimeter firewalls. Microsegmentation creates fine-grained policies at the individual workload level — controlling which specific applications and services can communicate with which other specific applications and services, regardless of which network segment they are on. Microsegmentation is more granular and typically enforced closer to the workload (host-based or SDN layer) rather than at the network perimeter.

How long does microsegmentation implementation take?

A realistic enterprise timeline for meaningful microsegmentation (not just initial segmentation, but a mature default-deny posture) is 18-36 months. The discovery phase alone (mapping east-west traffic) takes 3-6 months in complex environments. Phased enforcement across all workloads while maintaining operational stability is inherently slow. Organizations that try to compress this timeline by skipping the discovery phase and moving directly to enforcement consistently cause outages that set the program back further.

What is the biggest challenge in implementing microsegmentation?

Visibility into east-west traffic is the most commonly cited challenge — 87% of organizations cite it as the primary barrier. You cannot write segmentation policy for traffic flows you cannot see. Legacy applications often have undocumented dependencies that only appear when a segmentation rule blocks them in production. The discovery phase that maps all communication flows before enforcement begins is the operationally critical investment that separates successful microsegmentation programs from those that cause repeated outages.

Does microsegmentation replace firewalls?

No — microsegmentation and perimeter firewalls are complementary. Perimeter firewalls control north-south traffic (what enters and leaves the network). Microsegmentation controls east-west traffic (lateral movement within the network). A network with a strong perimeter but no internal segmentation fails when the perimeter is breached, which is the norm in modern attacks. The combination of perimeter controls and internal microsegmentation provides defense-in-depth.

Sources & references

  1. NIST SP 800-207 — Zero Trust Architecture
  2. CISA — Zero Trust Maturity Model
  3. Illumio — The State of Microsegmentation
  4. VMware NSX — Network Segmentation

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.