Back to Glossary

Network Segmentation

Dividing a network into isolated segments to contain breaches and limit lateral movement by attackers between systems.

infrastructurearchitecturedefense

Network segmentation divides a computer network into smaller, isolated sub-networks (segments) to improve security and performance. Each segment acts as its own network with independent access controls, so if an attacker compromises one segment, they cannot easily move laterally to others.

Effective segmentation strategies include: separating public-facing services from internal networks, isolating databases and sensitive data stores, creating dedicated segments for development and testing environments, and implementing micro-segmentation for critical workloads in cloud environments.

Modern approaches include software-defined segmentation using virtual networks and security groups (particularly in cloud environments like AWS VPCs), zero-trust network architectures that verify every connection regardless of network location, and micro-segmentation that applies per-workload policies.

How APVISO tests for this: APVISO runs each pentest scan inside an isolated container that mirrors how your application is accessed from the internet. This black-box approach reveals which internal services are inadvertently exposed through the web application and tests whether network-level controls effectively prevent unauthorized access to backend systems.

Test your applications for network segmentation vulnerabilities

APVISO's AI agents automatically test for this and many more vulnerability categories.

Start Testing Free