Flat Networks, Fast Breaches, and How Shared Services Undermine Internal Segmentation
In full posture assessments and incident response engagements I often found internal networks still flat. VLANs separated users, servers, management, or wireless, but without internal firewalls these zones offered little resistance and attackers could move freely. Even where segmentation existed, shared services like storage, Citrix, or management platforms spanned environments and bridged production with non-production. This was usually a trade-off between cost, complexity, and legacy design. Cloud stood out more positively, with Azure vNets, AWS VPCs, and GCP VPCs applying ACLs to segment traffic, though gaps remained around shared infrastructure. On paper segmentation looked effective, yet in practice it left broad paths open.
Read More