Smoke still lingered in the server room, not from fire, but from the breach. One gap in access control had let an attacker move sideways through systems. That gap existed because micro-segmentation and separation of duties were missing from the design.
Micro-Segmentation divides networks into small, isolated zones. Each zone has strict boundaries enforced by policies. Traffic between zones is allowed only when explicitly defined. This limits the blast radius of a compromise and makes lateral movement costly for an intruder.
Separation of Duties (SoD) ensures no single user or process can perform critical actions without oversight. One individual may have permission to initiate a deployment, but not to approve it. Another may grant database access but cannot deploy code. This principle reduces insider risk and mistakes by making misuse harder.
Combining micro-segmentation with separation of duties creates layered security. Micro-segmentation enforces least privilege at the network level. Separation of duties enforces least privilege at the workflow and identity level. A threat must bypass both barriers to succeed.