Infrastructure Security · IS-Q18B

Bonus Question: Are internal network segments protected through micro-segmentation or east-west traffic controls?

Why This Matters

Attackers often move laterally once inside. Micro-segmentation and internal firewalls limit propagation and improve visibility of insider threats.

Maturity

0 — Unaware
Flat internal network; no traffic restrictions.
1 — Ad Hoc
Some VLANs; no enforcement between departments.
2 — Defined
Internal zones created with ACLs or VLAN boundaries.
3 — Managed
Inter-zone policies defined and monitored.
4 — Integrated
Micro-segmentation via SDN or host-based firewalls.
5 — Optimized
Dynamic policy enforcement based on identity and behavior analytics.

How to Level Up

| From → To | Actions | |—|—| | 0 → 1 |Identify internal zones and key assets.|
| 1 → 2 |Apply ACLs and VLAN segmentation.|
| 2 → 3 |Define east-west policies and monitor logs.|
| 3 → 4 |Implement SDN or micro-segmentation tools.|
| 4 → 5 |Enable adaptive policies using analytics.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

| Purpose | Tool | Notes | |—|—|—| | Network visibility | Zeek | Flow analysis |
| Policy check | iptables-audit | Verify rules |
| Monitoring | ElastiFlow | Traffic telemetry |

Common Pitfalls

Compliance Mapping

| Standard | Clauses / Notes | |—|—| | ISO/IEC 27001 | A.8.23 / A.8.25 | | NIST CSF 2.0 | PR.AC / PR.PT | | CERT-In 2022 | Section 16 | | NIRMATA Mapping | IS-Q18B extends Infrastructure Security with micro-segmentation controls. |