A flat network is an all-you-can-eat buffet for anyone who gets past the perimeter. One compromised workstation, and the attacker can reach the domain controller, the database server, the backup system, and the CEO’s file share — all without crossing a single firewall. Lateral movement is the technique that turns a minor foothold into a catastrophic breach, and flat networks hand it to attackers for free.

Network segmentation is the architectural answer. Divide the network into trust zones. Put firewalls between them. Enforce rules about what can talk to what. When a workstation gets compromised — and eventually one will — segmentation is the difference between losing one machine and losing the entire environment. It’s not glamorous. It’s plumbing. But it’s plumbing that stops floods.

DO / DON’T

DO:

DON’T:

Trust Zone Design

Defining Trust Zones

A trust zone is a group of systems with similar security requirements and trust levels. Traffic within a zone flows relatively freely; traffic between zones passes through an enforcement point.

Common trust zones for most organizations:

Zone Contents Trust Level
DMZ Public-facing web servers, load balancers, reverse proxies Low — internet-facing, assume compromised
Application Application servers, middleware, APIs Medium — processes requests from DMZ
Data Databases, file servers, data warehouses High — stores sensitive data
Management Admin interfaces, jump boxes, monitoring, SIEM Highest — controls everything else
Workstation Employee desktops, laptops Medium-Low — most common initial compromise vector
IoT/OT Printers, cameras, HVAC, industrial control systems Lowest — unpatched, unmanaged, often insecure by design
Guest Guest Wi-Fi, contractor devices Untrusted — internet access only, no internal access

The principle: higher-trust zones should never be directly reachable from lower-trust zones without passing through an inspection point. A workstation should never connect directly to a database. It connects to an application in the application zone, which connects to the database on its behalf.

VLAN Implementation

VLAN Design

VLANs (Virtual LANs) provide the logical separation layer. Each trust zone maps to one or more VLANs with distinct IP subnets.

Subnet planning:

VLAN configuration best practices:

Inter-VLAN Routing and Firewalling

The enforcement happens at the routing layer. Options:

At minimum, every inter-VLAN path should have an ACL that enforces default deny with explicit allow rules for documented traffic flows. This alone stops the majority of lateral movement.

Firewall Placement and Rules

Internal Firewall Architecture

Don’t just put a firewall at the internet edge. Internal firewalls between trust zones are where segmentation becomes security.

Placement:

Rule Design

Monitoring East-West Traffic

Most organizations have solid north-south monitoring — firewalls, IDS/IPS, and web application firewalls inspect traffic entering and leaving the network. East-west traffic — traffic moving laterally between internal systems — is where attackers live after initial compromise, and it’s where most organizations are blind.

How to Monitor East-West Traffic

What to Alert On

Network Documentation

What to Document

You can’t defend what you can’t see, and you can’t troubleshoot what you can’t draw. Maintain these documents:

Review and update documentation with every change. A network diagram from last year is a historical document, not a security tool. NIST SP 800-53 Rev. 5 control SC-7 (Boundary Protection) specifically calls for documented network architectures and enforced traffic flow policies.

If It Already Happened

If an attacker has already moved laterally through your network during a breach:


Network segmentation is infrastructure work. It’s thankless, it’s tedious, and it’s the single most effective architectural control against lateral movement. Start by drawing your current network. Identify what’s flat. Pick your most critical asset — the database, the domain controller, the backup server — and isolate it into its own segment with firewall rules. That’s your first win. Then do the next one.