AS-301b · Module 3
Isolation Testing and Verification
3 min read
Good news, everyone! You have microsegmentation deployed, service mesh enforcing policies, egress controls in place, and tenant isolation configured. How do you know it actually works? You test it. Isolation that has not been tested is isolation you hope works. And hope, as I have mentioned, is not a security strategy.
- Negative Testing Attempt every connection that should be blocked. From Agent A, try to reach services not on its whitelist. From Tenant A's context, try to retrieve Tenant B's data. From inside the network, try to reach non-allowlisted external endpoints. Every blocked connection is a passed test. Every allowed connection that should have been blocked is a critical finding.
- Chaos Engineering for Isolation Inject failures that test isolation under stress. Kill a service mesh sidecar and verify that the agent loses connectivity rather than falling back to unmediated access. Rotate certificates and verify that expired credentials are rejected. Simulate a compromised agent and verify that the blast radius matches the communication map.
- Continuous Compliance Scanning Run automated scans that compare the deployed network policy against the approved communication map. Any deviation — a new connection that was not in the map, a removed restriction that was supposed to be permanent — generates an alert. The scan runs daily. Drift is caught in hours, not months.
Fundamentals aren't boring. Fundamentals are load-bearing.
— DRILL, Ryan Consulting Academy