Menu

Topic 7 of 8

Network Segmentation Concepts

Learn Network Segmentation Concepts for free with explanations, exercises, and a quick test (for Data Architect).

Published: January 18, 2026 | Updated: January 18, 2026

Why this matters

As a Data Architect, you design data platforms that must be both reliable and secure. Network segmentation limits blast radius, protects sensitive data (PII, secrets, keys), and enforces least privilege between services. You will use segmentation to:

  • Isolate ingestion, processing, and analytics zones.
  • Protect shared services (metastores, control planes, secrets) from broad access.
  • Enable compliant data flows (e.g., DMZ for public-facing APIs, private-only paths for internal workloads).
  • Reduce attack surface and simplify audits by grouping assets with similar risk.

Concept explained simply

Simple definition

Network segmentation is the practice of breaking a network into smaller parts (segments) and tightly controlling what can talk to what. Think of a building with rooms: doors limit movement; badges decide who can go through; cameras monitor corridors. Segments are rooms, rules are doors, identities are badges.

Mental model

Use the 3Z model: Zone (a group with similar risk, e.g., Public, DMZ, Private), Subset (subnets/VLANs inside zones), Zero trust edges (fine-grained, identity-aware allow rules between specific services). Start wide (zones), then narrow (subnets), then precise (per-service rules).

Core building blocks

  • Layered boundaries: VLANs/L2, subnets/L3, routers, firewalls, security groups, network ACLs, route tables.
  • Zones: Public/DMZ, Ingestion, Processing, Analytics, Management/Shared Services, Data Stores.
  • Controls: Allow-lists, deny by default, identity-based policies (service identity, mTLS), private endpoints, NAT for controlled egress, logging.
  • Microsegmentation: East–west controls between workloads inside the same zone or host (labels/tags, identity, ports).

Worked examples

Example 1: Cloud analytics VPC
  • Zones/subnets: DMZ (public LB), Ingestion (collectors), Processing (ETL/Spark), Data (object store/private endpoint), Analytics (BI tools), Management (bastion/monitoring).
  • Routing: Public internet only to DMZ LB. Private endpoints for object store and managed databases. No public IPs for Processing/Data.
  • Rules: Allow Processing -> Data on TCP 443 (object store endpoint). Allow Analytics -> Data read-only on TCP 443. Deny lateral traffic between Processing instances except required Spark ports. Management subnet can SSH/RDP using just-in-time access via bastion; block direct admin from internet.
Example 2: On‑prem data center
  • VLANs: 10 (DMZ), 20 (Ingestion), 30 (Processing), 40 (Analytics), 50 (Mgmt), 60 (DB).
  • Inter‑VLAN firewall: Default deny; explicit service allow lists (e.g., VLAN30 -> VLAN60 TCP 5432 to DB).
  • North–south: Reverse proxy in DMZ terminates TLS and forwards to Ingestion. Only Mgmt VLAN can access hypervisor and backups.
Example 3: Hybrid and microsegmentation
  • Private connectivity (VPN/Direct) from cloud Processing to on‑prem DB through a transit network; no internet path.
  • Identity‑based rules: Only the ETL service identity may call DB on 5432; other workloads in Processing denied even if on same subnet.
  • mTLS between microservices; sidecar/agent enforces labels like env=prod, role=etl.

Design steps (follow these every time)

  1. Classify data and services: public, internal, restricted, secret.
  2. Define zones and subnets: DMZ, Ingestion, Processing, Analytics, Management, Data.
  3. Map required flows: source -> destination -> protocol/port -> direction -> identity.
  4. Choose controls: route isolation, firewalls, security groups/NACLs, private endpoints, NAT, microsegmentation.
  5. Default deny; create minimal allow rules; log and monitor.
  6. Test: connectivity probes, policy simulation, break‑glass path for ops.
  7. Document: diagrams, rule tables, owners, review cadence.

Exercises

Do these to reinforce concepts. Write answers in your notes or a text file.

Exercise 1 (ex1): Segment a small pipeline

Scenario: Public API ingests events -> lands to object storage -> ETL transforms -> warehouse -> BI dashboards. Propose zones/subnets and the minimum allow rules. Identify any private endpoints and where NAT is needed.

Exercise 2 (ex2): Microsegmentation for Spark

Scenario: A Spark job (driver + executors) reads from object storage, writes to warehouse, uses a Hive Metastore, and sends metrics to monitoring. Define specific east–west and outbound rules (ports/directions) that are strictly necessary.

Self-check checklist

  • Each zone has a clear purpose and owner.
  • Default deny is in place at inter-zone boundaries.
  • Only specific ports/protocols are allowed; no 'any-any'.
  • No public IPs in Processing/Data zones.
  • Sensitive stores reachable only via private endpoints or private links.
  • East–west traffic restricted between peers; microsegmentation or SGs used.
  • Egress paths controlled via NAT or explicit private services.
  • All decisions logged; you can audit who accessed what.

Common mistakes and how to self-check

  • Allowing wide egress (any to internet). Self‑check: List all egress rules; verify destinations are restricted to known endpoints.
  • Flat internal networks. Self‑check: Count subnets/VLANs vs. risk categories; they should align.
  • Port‑based rules without identity. Self‑check: Can any workload on the subnet use the rule? If yes, add identity conditions.
  • Forgetting management plane. Self‑check: Ensure admin tools live in a Management zone with just‑in‑time access.
  • Unlogged exceptions. Self‑check: Every temporary rule has an expiry and is logged.

Practical projects

  • Design a two‑VPC (or two‑site) segmented data platform with a transit network and private endpoints to data stores. Deliver a diagram plus a rule matrix.
  • Create a least‑privilege security group/NACL set for a three‑tier analytics app. Prove with connectivity tests (simulate allowed/blocked paths).
  • Implement microsegmentation policies (labels/identities) for three services: ETL, Metastore, Metrics. Show only ETL can reach Metastore on its port.

Mini challenge

You discover a rule allowing Analytics zone to talk to Processing on any TCP port. In two steps, propose a safer replacement: 1) enumerate required flows; 2) craft the minimal policy. Write the final allow list.

Learning path

  • Before this: Networking basics (IP, subnets, routing), IAM fundamentals, TLS.
  • Now: Network Segmentation Concepts (this lesson).
  • Next: Zero trust patterns, Private connectivity (endpoints/peering), Data exfiltration controls, Network monitoring/alerting.

Who this is for

  • Data Architects designing secure data platforms.
  • Platform/Data Engineers implementing network controls.
  • Security Architects collaborating on data environments.

Prerequisites

  • Comfort with IP addressing, CIDR, and routing basics.
  • Understanding of your cloud/on‑prem firewall and security group concepts.
  • Basic knowledge of your data stack ports/services (DB, object store, Spark, BI).

Next steps

  • Complete the exercises and the quick test below.
  • Review your current environment against the checklist; open tasks for any gaps.
  • Move on to zero trust and private endpoint design.

Quick Test note: The test is available to everyone. If you are logged in, your progress will be saved automatically.

Practice Exercises

2 exercises to complete

Instructions

Design zones/subnets and allow rules for this flow: Public API -> Ingestion -> Object Storage -> ETL (Processing) -> Data Warehouse -> BI (Analytics). Include:

  • Named zones and their purpose.
  • Any private endpoints needed.
  • Exact allow rules (source, destination, protocol/port).
  • Where NAT is used for egress, if any.
Expected Output
A concise design listing zones, subnets, private endpoints to storage/warehouse, and a minimal allow-list (e.g., Processing -> ObjectStorage TCP 443 via private endpoint; Analytics -> Warehouse TCP 443; DMZ LB -> Ingestion TCP 443).

Network Segmentation Concepts — Quick Test

Test your knowledge with 8 questions. Pass with 70% or higher.

8 questions70% to pass

Have questions about Network Segmentation Concepts?

AI Assistant

Ask questions about this tool