Network isolation patterns
Let's get started!
Problem
Why is network isolation needed and how can we achieve network isolation?
Context
Most organizations’ applications are distributed across different data centers and multiple cloud environments based on business needs. These applications need to connect to other cloud and on-premises applications to fulfill their functions. Networks are currently protected with perimeter-based network security. This mostly enables what is called north-south (client to server) traffic and is typically done by leveraging network firewalls. But applications or assets within the network are generally trusted, and east-west traffic is allowed without any controls. This traditional approach of network protection cannot be extended to the cloud because if the network gets attacked, it exposes the entire internal and external network that is spread across the cloud. Modern security thinking, in fact, says that you should assume that...