
Real-world analysis of operational impact and recovery after a large-scale ransomware attack: the Asahi case
15 de January de 2026
Banking resilience against massive attacks: architecture, regulation, and strategic solutions
29 de January de 2026Key point in most incidents
In the forensic analysis of serious incidents, there is a pattern that repeats with uncomfortable regularity: initial access is not the critical problem. Stolen credentials, poorly secured remote access, exposed services, or human errors end up opening the door. But the real impact occurs afterward, when the attacker takes advantage of internal connectivity to move laterally, escalate privileges, and reach critical assets with hardly any restrictions.
For years, network architectures have been designed under an implicit principle of internal trust. Once inside the perimeter, controls are relaxed, traffic flows freely, and visibility decreases. This model is incompatible with modern malware, which does not need to exploit complex vulnerabilities if it can reuse legitimate identities and move without restrictions. Emerges as a direct response to this structural flaw in traditional network design.
Microsegmentation: technical definition and actual scope
Microsegmentation is an internal communications control architecture that divides the network into extremely granular security domains, applying explicit access policies between workloads, identities, processes, and services. Its goal is not to filter generic traffic but to explicitly authorize each internal flow, reducing connectivity to zero by default.
On a technical level, microsegmentation operates on traffic, regardless of whether the infrastructure is physical, virtualized, containerized, or hybrid. It does not rely exclusively on IP addresses or subnets, but on logical attributes such as identity, role, system function, workload type, or execution context. This allows for consistent policies even in dynamic environments where IPs constantly change.
The result is a network in which internal connectivity is no longer implicit and becomes a controlled exception.
Lateral movement as an impact vector
Lateral movement is not an isolated technique but a structural phase in almost all advanced attacks. Once inside, the attacker needs to discover services, enumerate accounts, reuse credentials, and find paths to higher-value systems. Protocols such as SMB, RDP, SSH, RPC, WMI, or WinRM become legitimate tools for the attacker, precisely because they are generally allowed within the network.
In this context, malware does not need to generate anomalous traffic or noisy behavior. It behaves like another user or service, leveraging a flat topology that was not designed to withstand internal compromises. Microsegmentation breaks this dynamic by imposing strict limits on propagation, even when the attacker has valid credentials.
Explicit policies based on identity and function
One of the technical pillars of microsegmentation is the replacement of the “everything can talk to everything” model with a model of explicit authorization. Each internal communication must be justified by a real operational need. An application server can only communicate with the services strictly necessary for its function. A user accesses only the systems required by their role. A process cannot initiate lateral connections outside its functional scope.
This approach turns the network into a natural extension of the principle of least privilege. Malware inherits the compromised identity but also inherits its restrictions. It cannot freely explore the network, cannot enumerate unauthorized services, and cannot pivot to other systems without breaking an explicit policy.
Automatic containment and reduction of blast radius
From an incident response point of view, microsegmentation introduces a critical advantage: automatic containment. When a system is compromised, its ability to affect the rest of the infrastructure is limited from the outset. The attacker cannot extend the compromise, drastically reducing operational impact, exposure time, and recovery complexity.
This approach does not rely on perfect detection. It assumes failure will occur and designs the network so that such failure is local, controlled, and reversible. In terms of resilience, it is a paradigm shift compared to purely preventive models.
The central role of east-west traffic
Historically, network security has focused on north-south traffic. Perimeter firewalls, proxies, and deep inspection systems have protected access to and from the outside. However, current attacks mostly unfold within the network, where visibility is lower and policies tend to be more lax.
Microsegmentation shifts the security focus to east-west traffic, where the real spread of the attack occurs. By inspecting, controlling, and authorizing these internal communications, the main expansion channel of modern malware is eliminated.
Microsegmentation as the technical materialization of Zero Trust
Zero Trust is not a product or a trend; it is a logical consequence of assuming that the internal network is not trustworthy. Without microsegmentation, Zero Trust remains a strong authentication layer at initial access. With microsegmentation, it becomes a complete operational model where each internal interaction is evaluated and authorized.
In this sense, microsegmentation is not a complement to Zero Trust, but one of its fundamental technical pillars. It eliminates implicit trust, applies continuous verification, and maintains consistent controls even in highly dynamic environments.
Application in critical and high-complexity environments
Microsegmentation becomes especially relevant in environments where availability and integrity are critical. Industrial infrastructures, telecommunications networks, energy environments, and hybrid architectures present broad and heterogeneous attack surfaces. In these scenarios, a single successful lateral movement can have serious operational, economic, or even regulatory consequences.
By strictly limiting internal connectivity, microsegmentation introduces a level of control that does not depend on the individual robustness of each system but on the overall design of the network.
Technical challenges and design considerations
Implementing microsegmentation effectively requires full visibility of internal traffic and a deep understanding of the real dependencies between systems. Without this visibility, policies become fragile or excessively permissive. Microsegmentation must not be static, but adaptive, audited, and aligned with the operational changes of the organization.
The most common error is not technical, but conceptual: trying to apply microsegmentation as if it were an extension of the traditional firewall, without embracing the model shift it implies.
Future vision: networks designed to assume compromise
The future of cybersecurity does not lie in more open and faster networks, but in deliberately restrictive networks, aware of their attack surface and designed to limit damage. Microsegmentation clearly represents this vision: assuming that compromise is possible and designing the infrastructure so that such compromise does not escalate.
The relevant question is no longer whether an attacker will get in, but what they will find when they do. A microsegmented network responds with limits, control, and containment. And in the current threat landscape, that response makes the difference between a manageable incident and a structural crisis.
Endurance, microsegmentation, and NIS2 compliance: structural control against lateral movement
Microsegmentation is not just a network design concept; in the context of Endurance, it is an inherent property of its architecture. Thanks to its design, Endurance applies microsegmentation natively, ensuring that each privileged access or remote session is strictly controlled, isolated, and authorized. Each user interacts only with the assets they need, under policies based on identity, function, and context, with no credential exposure or lateral connectivity. From the malware’s point of view, the internal network ceases to be an exploitable vector: there are no routes to pivot, no services to enumerate, no east-west traffic to exploit.
This microsegmentation applied by design transforms the way organizations manage lateral movement. It is not an additional layer of protection: it is the way Endurance ensures that each access is secure and limited from its origin. Even in critical, heterogeneous, and highly dynamic environments (industrial infrastructures, OT environments, telecommunications, or legacy systems), each session becomes an isolated microdomain, maintaining operational continuity and minimizing the risk of propagation.
NIS2 compliance and structural security
When analyzed from the perspective of the NIS2 directive, the relevance of this architecture becomes even clearer. NIS2 establishes strict obligations in risk management, critical asset protection, and incident propagation prevention. The directive requires measures that ensure effective system segmentation, the limitation of privileged access, and the traceability of each interaction. Endurance facilitates compliance with these requirements structurally: its access policies by identity, session, and asset create a microsegmentation framework that ensures that critical systems can only be interacted with under strictly defined conditions, without relying on the underlying network topology.
Additionally, Endurance provides complete traceability and continuous control of each session, allowing for auditing of access, generation of technical evidence for regulatory reporting, and support for incident management in accordance with NIS2. This visibility not only facilitates regulatory compliance but also strengthens the security posture against internal and external attacks, ensuring that any compromise is contained from the first moment.
In summary, the combination of microsegmentation applied by design and granular control of privileged access makes Endurance a strategic component. It limits the blast radius of any intrusion, eliminates the possibility of lateral movement within the network, and facilitates proactive compliance with NIS2 requirements. Security ceases to be just another layer: it becomes a structural property of the infrastructure.
This approach reflects a modern and effective vision of cybersecurity: to assume compromise is possible, to design infrastructure to contain it, and to manage access with surgical precision. With Endurance, microsegmentation ceases to be a theoretical concept and becomes a real, verifiable defense aligned with the most demanding regulatory standards.




