PGA TRAINING

Do you have controls in place for network segmentation of sensitive data?

 Guidance

  • Categorize and locate sensitive data within the network.

  • Implement VLANs, subnetting, or micro-segmentation to isolate and protect sensitive data.

  • Configure access restrictions to limit unauthorized access to segmented networks.

  • Sample Network Segmentation Policy for Sensitive Data

    1.  Purpose

    The purpose of this policy is to establish guidelines for the network segmentation of sensitive data within the organization. Effective network segmentation is crucial for protecting sensitive data from unauthorized access and ensuring compliance with legal and regulatory requirements.

    2.  Scope

    This policy applies to all employees, contractors, and third parties who have access to the organization's network infrastructure. It encompasses all network segments that handle or store sensitive data.

    3.  Policy

    4.  1. Identify Sensitive Data

    • Data Categorization: The organization will categorize all data based on its sensitivity. This includes personal identifiable information (PII), financial data, intellectual property, and any other data deemed sensitive by the organization.

    • Data Mapping: Sensitive data must be identified and located within the network infrastructure. Regular audits should be conducted to ensure accurate data mapping.

    5.  2. Segment Networks

    • VLANs: Virtual Local Area Networks (VLANs) will be used to separate sensitive data from the general network traffic. Each VLAN will be configured according to the sensitivity and criticality of the data it handles.

    • Subnetting: The network will be divided into subnets to further isolate sensitive data and reduce the risk of unauthorized access.

    • Micro-segmentation: Where applicable, micro-segmentation will be implemented to provide more granular control and isolation of sensitive data, ensuring that only authorized traffic can reach sensitive segments.

    6.  3. Access Controls

    • Access Restrictions: Access to network segments that contain sensitive data will be strictly controlled. Only authorized personnel with a legitimate business need will be granted access.

    • Firewalls and ACLs: Firewalls and Access Control Lists (ACLs) will be configured to enforce access restrictions and monitor traffic between network segments.

    • Network Monitoring: Continuous monitoring of network traffic will be conducted to detect and respond to any unauthorized access attempts.

    7.  Responsibilities

    • Network Security Team: Responsible for the implementation and maintenance of network segmentation, including the configuration of VLANs, subnets, and access controls.

    • IT Department: Ensure that network segmentation aligns with the organization’s overall IT and security strategies. Regularly update and patch network devices to maintain security.

    • Data Owners: Identify and classify sensitive data within their departments and ensure it is stored within the appropriate network segments.

    • Employees: Adhere to the access control procedures and report any suspicious activity or security breaches.

    8.  Compliance

    Failure to comply with this policy may result in disciplinary action, up to and including termination of employment. Non-compliance with this policy may also subject the organization to legal or regulatory penalties.

    9.  Review and Revision

    This policy will be reviewed annually or as needed to respond to changes in regulatory requirements, technology, or organizational processes.

    10.  Effective Date

    This policy is effective as of [Effective Date].

    11.  Approval

    Approved by: [Approving Authority] Date: [Approval Date]

    By implementing this network segmentation policy, the organization ensures that sensitive data is adequately protected and that access to such data is strictly controlled. This approach minimizes the risk of data breaches and enhances overall network security.