Security & DevSecOps Practical By Samson Tanimawo, PhD Published Feb 4, 2026 4 min read

Network Segmentation Patterns

Segment networks to bound breach impact.

VPC segmentation

Network segmentation is the security architecture pattern of dividing your network into smaller, controlled segments where traffic between segments is restricted by default. The flat-network alternative (everything reaches everything) is the architecture that makes lateral movement easy after a breach. Segmentation is what bounds the blast radius.

What VPC-level segmentation looks like:

VPC segmentation is the macro layer of network security. It does not catch every attack but it caps the damage of the attacks that succeed. Done correctly, it is the difference between "an incident affecting one service" and "an incident affecting the whole platform."

Namespace policies

Below the VPC layer, Kubernetes provides namespace-level segmentation through NetworkPolicy resources. The namespace is the natural boundary; the NetworkPolicy declares what crosses the boundary. Done correctly, namespace policies provide pod-to-pod segmentation at fine granularity.

Namespace policies are the micro layer of network security. Together with VPC segmentation, they produce defense in depth from the cluster perimeter to the individual pod.

Review

Network segmentation drifts. New services get added with permissive default rules. Old services stop being used but their network rules persist. The map of "what can reach what" diverges from the map the team thinks they have. The fix is regular review.

Network segmentation done right is the architecture pattern that bounds the damage of any single compromise. Nova AI Ops audits VPC and NetworkPolicy configurations, surfaces the cases where segments have drifted from the intended architecture, and runs continuous segmentation tests so the team has confidence the network defenses are actually working.