Easy As DMZ

This post is just a quick “holy cow” on the lack of network segmentation we are discovering as a result of a recent incident. Fortunately, not our Clients, but as we continue to read through the aftermath, we are finding that some institutions were fully breached because their ATMs were not walled off.

Within the broader strategy of network security, segmentation is now reaching late majority adoption. This is castle/moat technology that we point back to in our Zero Trust rants, folks.

The risk mitigation more than covers the cost.

And network segmentation does not have to be complicated. It’s almost as simple as putting your public facing assets in a DMZ! There are some clear “low hanging fruit” approaches. Beyond your DMZ and your guest network, your ATMs should be put in their own segment. And you should also consider putting VoIP and IoT on their own segments, segregating servers with high or critical data, and considering ways to prevent lateral movement during a breach.

From an impact severity, likelihood of attack, customer visibility, availability risk mitigation, and just plain common-sense perspective, ATMs make a great place to start with network segmentation.

Original article by Dan Hadaway CRISC CISA CISM. Founder and Information Architect, infotex


Dan’s New Leaf – a fun blog to inspire thought in  IT Governance.

To see more content like this in your inbox, sign up for our newsletter here!

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts

The Magnificent Seven 2023

Seven Trends . . . …that small bank Information Security Officers face in 2023 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome t...

“Lock It” – Awareness Poster

Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers!Check out posters.infotex.com for th...