Skip to main content

Segments

1. Introduction

Zero Trust micro-segmentation requires organizations to create and enforce precise, least-privilege policies across workloads in dynamic environments. ColorTokens Xshield introduces the concept of segments to group assets (e.g., servers, applications) that exhibit similar behavior, simplifying policy management and visualization.

This document outlines the strategic and operational benefits of using segments in Xshield and their critical role in implementing Zero Trust at an enterprise scale.

2. What Are Segments in ColorTokens Xshield

A segment in Xshield is a logical grouping of assets that share common characteristics such as:

  • Environment (e.g., dev, staging, production)
  • Role or function (e.g., database servers, web frontends)
  • Application type or tier (e.g., middleware)
  • Business unit or ownership (e.g., finance, marketing, Projects)

Segments are defined using tags, allowing Xshield to automatically assign assets based on metadata from cloud providers, orchestration tools, or custom input.

Key Characteristics:

  • Logical Security Boundary: Acts as a distinct zone for policy enforcement.
  • Collection of Assets: Includes VMs, containers, endpoints, and users.
  • Policy Domains: Entities within a segment adhere to uniform access rules.
  • Tag-Based Assignment: Assets are dynamically grouped using tags.

3. Strategic Benefits of Segments

3.1 Simplified Network Visualization

  • High-level view of network interactions
  • Focus on application or business context rather than individual workloads
  • Quickly identify policy violations or anomalies

3.2 Scalable Policy Management

  • Apply policy templates across all assets in a segment
  • Enable automated policy inheritance
  • Maintain consistency and reduce human error

3.3 Dynamic Asset Classification

  • Automatically assign workloads to the right segment
  • Continuously enforce correct security posture
  • Accelerate onboarding and reduce operational overhead

3.4 Improved Incident Response

  • Quickly isolate affected zones during incidents
  • Trace lateral movement across segment boundaries
  • Use contextual insights for root cause analysis

3.5 Alignment with Zero Trust Principles

  • Define clear trust boundaries
  • Enforce least-privilege policies
  • Adapt to change using dynamic tagging

4. Segment Detail Page

The Segment Detail Page provides security teams with a dedicated view into each segment, helping them assess its security posture, traffic flows, and policy effectiveness. It brings together contextual insights, visualizations, and actionable controls in one place.

Key Features

  • Centralized Context: View all assets, policies and observed communications within the selected segment.

  • Breach Impact Analysis: Assess the potential blast radius of a compromised asset with attack surface insights mapped to MITRE ATT&CK techniques.

  • Mitre attack mapping: Proactively assess and mitigate potential lateral movement vectors that may compromise the segment's security posture.

  • Traffic Visualization: Visualize traffic flows inside the segment to detect anomalies and refine segmentation.

  • Progress Tracking: Visualize milestone achievements as policies move from test to enforce mode.

5. Operational Benefits and Use Cases

5.1 Why Use Segments

Segments enhance security by minimizing lateral movement and reducing the attack surface. They:

  • Abstract per-asset policy into group-based control
  • Isolate environments (e.g., Production vs Development)
  • Simplify policy creation
  • Improve manageability, visibility, and operational simplicity

5.2 Types of Segments

  • Environment-Based: Development, Staging, Production
  • Application Layer: Web-Tier, App-Tier, Database-Tier
  • Role-Based: Authentication, Ad-Servers, Gateways
  • User Segments: Finance, HR, Contractors

6. Policy Automation

Policy Automation is a segment-level configuration that controls how policies progress through their deployment lifecycle. It defines how Attack Surface and Blast Radius progressive states are managed and whether policy changes require manual action or can be automated.

Within Policy Automation, you can configure:

  • Progressive states for Attack Surface and Blast Radius
  • Whether Auto Deployment is enabled
  • The enforcement criteria and minimum test duration (if Enforce mode is selected)

6.1 Auto Deployment

Auto Deployment is a feature within the Policy Automation. When enabled, the deployment of policies to the assets within the segment is automated.

This means - When there are policy changes to assets within a segment such as attaching new templates or modifying attached templates, the policies are automatically deployed to the assets within the segment. It ensures that your Test and Enforce cycles run continuously without requiring manual intervention.

6.2 Auto Deployment Modes

Auto Deployment allows Xshield to automatically deploy policy changes within a segment without requiring manual intervention. Depending on the selected mode, policies are deployed based on defined enforcement criteria.

Auto Deployment can be configured in three modes: Test Only, Enforce After Testing and Enforce Without Testing.

1. Test Only

When Test Only is selected, Auto Deployment ensures that all new or modified policies are deployed in Test mode without automatic enforcement.

Behavior:

  • All newly added or modified asset and port policies are automatically deployed in Test mode.
  • Policies already in Enforce mode remain unchanged.
  • Policies deployed in Test mode remain in that state until they are manually transitioned to Enforce

This mode is recommended when organizations require continuous policy rollout while retaining explicit administrative control over enforcement decisions. It allows security teams to validate behavior, assess potential impact, and reduce operational risk before enabling enforcement.

2. Enforce After Testing

When Enforce After Testing is selected, Auto Deployment follows a controlled Test → Enforce progression based on a configurable validation period.

Behavior:

  • All newly added or modified asset and port policies are automatically deployed in Test mode.
  • A minimum test duration (in days) must be configured.
    • The default value is 3 days.
  • A policy becomes eligible for enforcement once:
    • It has remained continuously in Test mode for at least the configured number of days, and
    • It satisfies the defined enforcement criteria.
Important Clarification on Test Duration Calculation
  • Policies already in Enforce mode remain unchanged.
  • Existing policies in Test mode are evaluated against:
    1. Their original test start timestamp and
    2. The configured test duration and enforcement criteria. If both conditions are satisfied, those policies are immediately transitioned to Enforce mode.

3. Enforce Without Testing

When Enforce Without Testing is selected, all policies are deployed directly in Enforce mode without a validation period in Test.

Behavior:

  • All new, modified, and existing asset and port policies are deployed in Enforce mode.
  • Policies currently in Test mode are automatically transitioned to Enforce mode.
  • No minimum test duration or validation period is applied.
  • Enforcement occurs immediately after the configuration is saved.

This mode is intended for controlled environments where policies have already been validated, or where immediate risk reduction is required. It bypasses the Test phase entirely and ensures rapid enforcement across applicable assets.

info

Assets that have deployment disabled are excluded from auto deployment.

6.3 Why is Auto-Deployment Useful

Auto Deployment enhances operational efficiency and security consistency by eliminating manual Test and Enforce cycles. It ensures that policy changes are automatically deployed and progressed according to defined criteria, maintaining continuous protection across the segment.

  • Saves time: Automatically deploys new or updated policies without requiring manual intervention.
  • Reduces errors: Ensures predictable and uniform policy deployment, minimizing configuration mistakes.
  • Improves responsiveness: Policy updates are immediately deployed in controlled Test mode and automatically progressed to Enforce when ready

6.4 When to Use Auto Deployment

Enable Auto Deployment when you want to automate the Test → Validate → Enforce workflow and minimize manual intervention. It is most effective in scenarios where policies must adapt quickly and consistently across the environment.

Auto Deployment is particularly useful for:

  • Dynamic environments where new assets, services or port changes occur frequently.
  • Large-scale deployments that benefit from rapid and consistent policy rollout.
  • Continuous enforcement strategies where security posture must evolve automatically based on observed traffic behavior.

7. Case Study: Acme Corp Segmentation Strategy

Acme Corp uses Xshield to implement segmentation across its global workloads.

Macro Segments:

Segment NameTagDescription
Env-ProductionEnvironment=ProductionWorkloads in production stage
Env-DevelopmentEnvironment=DevelopmentDev workloads

Policy Assignments:

SegmentAllowed CommunicationNotes
Env-DevelopmentInternet, DNS, SSH via Bastion-DevAccess only via bastion
Env-ProductionDNS, AD, NTP, Logging, RDP via Bastion-ProdNo direct RDP/SSH

Access Design Patterns:

  • Bastion-Dev for SSH into Env-Development
  • Bastion-Prod for RDP into Env-Production

Policies:

  • SSH/RDP only from bastions
  • Deny direct access from user devices

7.1 Evolving Segments Over Time

After macro segmentation is stable, Acme Corp introduces:

  • Application and User-based segments
  • Regular reviews of segment membership and tags

8. Conclusion

Segments in ColorTokens Xshield transform how Zero Trust micro-segmentation is implemented and maintained. By grouping assets based on behavior and applying centralized policies:

  • Organizations gain simplicity and scalability
  • Security enforcement becomes more consistent and adaptive
  • Operations are aligned with the demands of dynamic, multi-cloud environments

As enterprises evolve, segmentation isn’t just beneficial—it’s essential for sustainable Zero Trust at scale.