Create effective segmentation security policies

Akamai Guardicore Segmentation provides the simplest, fastest, and most intuitive way to enforce Zero Trust principles within your network. With segmentation policies, malware cannot access the ports and protocols necessary for copying itself and spreading to other critical servers and data centers, or seek vulnerable data in the network.

The enforcement features of ‚ÄčAkamai‚Äč Guardicore Segmentation focus on two goals: rapid design and implementation of connectivity policies, and flexibility in constructing policy rules that enable dealing with a wide range of environments and situations.

Zero Trust Network Access (ZTNA) draws upon a set of rules that form a policy that in turn determines whether or not to allow access to your organization’s network or apps. The ZTNA policy’s guiding principle denies access to all traffic, except for traffic specified in the policy’s rules. This can mean allowing only devices with an antivirus installed, devices running a specific firmware version, and more.

Create your own segmentation policy

Policy creation is made easy with prebuilt templates for the most common use cases. Policy enforcement is completely decoupled from the underlying infrastructure, so security policies can be created or altered without complex network changes or downtime.

Before you begin

Before you begin creating policies, we recommend using the Network Log.
The Network Log records all communication flows between the organization’s Assets, and between the Assets and the outside world. Access the Network Log and focus on any security violations that may be presented. Use filters to narrow the list and then suggest rules. View the generated map with rule suggestions.

Step 1: Select a template

Select one of two types of policy templates:
Prebuilt templates generate policies for known applications such as the Active Directory.
DIY templates generate policies for securing specified applications- these templates achieve a particular security goal for a specific application.

Step 2: Select assets

Select the assets you wish to secure.

Step 3: Review the rules suggested by Centra

Based on the template and assets, Centra’s AI-powered segmentation engine automatically generates a set of rules. Review the rules and make changes if desired.
You can also add a custom rule.

Step 4: Publish your policy

After selecting a template, selecting assets to secure, and selecting the rules on which the policy is based, the next and final step is to publish your policy.

ūüďė

Further details

For details on creating ZTNA segmentation policies, read the full ‚ÄčAkamai‚Äč Guardicore Segmentation online help (login required).