Skip to content

Menu

  • Contact Us

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • May 2023
  • March 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • June 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • August 2021
  • June 2021
  • April 2021
  • March 2021
  • January 2021

Calendar

June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Aug    

Categories

  • Analytics Governance
  • Azure and AWS
  • Cloud security overview
  • Microsoft AWS Exams
  • Speed of innovation
  • Step to Create Data Strategy
Introduction to AWS Security Concepts and the Shared Responsibility Model - Microsoft AWS
  • Contact Us
Written by Xavier Smith08/01/2024

Best practices for designing secure VPCs – Infrastructure Security – Keeping Your VPC secure

Analytics Governance . Cloud security overview . Microsoft AWS Exams Article

Best practices for designing secure VPCs

This section will guide you through a series of best practices that can guide you in designing a skeleton for your VPCs that is not only functional but also secure. These practices are not exhaustive, but they provide a solid foundation for building secure VPCs.

Use subnet segregation heavily

One of the most effective ways to enhance security within a VPC is through heavy subnet segregation. The flexibility offered by VPCs, with virtually no limitation in the number of subnets, allows for granular micro-segmentation. This is a significant advantage over traditional networking, where the number of subnets is limited by physical constraints.

Micro-segmentation involves dividing a VPC into many small, isolated subnets, each hosting a limited number of resources. This approach can significantly improve resources segregation and reduce the attack surface. If a resource in one subnet is compromised, the impact is contained within that subnet and does not affect resources in other subnets. This is a fundamental principle of the zero-trust approach, where each micro-segment of the network is considered a separate trust zone and is secured accordingly. It is a stark contrast to traditional flat network designs where attackers can easily move laterally and jeopardize other systems once they have infiltrated the network.

When designing your VPCs, consider creating separate subnets for different types of resources based on their function and sensitivity. For example, web servers, application servers, and databases should each be placed in separate subnets. Furthermore, you can apply different security controls to each subnet based on the sensitivity and function of the resources within it.

The following figure (Figure 2.2) compares traditional segmentation using a limited number of subnets (on the left) with micro-segmentation using a large number of isolated subnets (on the right):

Figure 2.2 – Traditional segmentation and micro-segmentation comparison

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • May 2023
  • March 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • June 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • August 2021
  • June 2021
  • April 2021
  • March 2021
  • January 2021

Categories

  • Analytics Governance
  • Azure and AWS
  • Cloud security overview
  • Microsoft AWS Exams
  • Speed of innovation
  • Step to Create Data Strategy

Copyright © 2024 summerbelong.com. All Rights Reserved.