From cybersecurity-skills
Configure microsegmentation policies with VMware NSX, Illumio, Calico for zero trust workload isolation, preventing lateral movement in networks.
npx claudepluginhub mukul975/anthropic-cybersecurity-skills --plugin cybersecurity-skillsThis skill uses the workspace's default tool permissions.
- Understanding of zero trust principles (NIST SP 800-207)
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
Microsegmentation divides a network into granular security zones, enforcing least-privilege access between workloads at the application layer rather than relying on traditional VLAN-based segmentation. In a zero trust architecture, microsegmentation eliminates implicit trust between workloads within the same network segment, preventing lateral movement even after an attacker gains initial access.
This skill covers designing microsegmentation policies using workload identity, implementing host-based and network-based enforcement, and validating segmentation effectiveness with tools like Illumio Core and VMware NSX.
Traditional Segmentation Microsegmentation
┌─────────────────┐ ┌──────────────────────┐
│ VLAN 10 │ │ Workload A ←policy→ │
│ ┌───┐ ┌───┐ │ │ Workload B ←policy→ │
│ │ A │ │ B │ │ │ Workload C ←policy→ │
│ └───┘ └───┘ │ │ Workload D ←policy→ │
│ (trust each │ │ (zero trust between │
│ other) │ │ every pair) │
└─────────────────┘ └──────────────────────┘
Before creating segmentation policies, discover actual communication flows between workloads using traffic telemetry. Tools like Illumio, Guardicore, and AppDynamics provide application dependency maps showing which workloads communicate, over which ports, and how frequently.
Draft policies in monitor/visibility mode before enforcement. This allows validation that proposed rules will not break legitimate traffic while identifying unnecessary or risky communication paths.
Modern microsegmentation uses labels (role, application, environment, location) instead of IP-based rules. Label-based policies are portable across environments and survive IP changes during migrations.
Isolate critical applications (PCI cardholder data environment, SWIFT financial systems, healthcare PHI) with strict allow-list policies that deny all traffic not explicitly permitted.
Deploy Visibility Agents
Build Application Dependency Map
Assign Labels
Define Segmentation Zones
Create Allow-List Policies
Model Policies in Test Mode
Enforce Incrementally
Validate Segmentation