* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate/) * [未分类](https://www.paloaltonetworks.com.au/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant) * 在阿里云上实现云资源的微分段隔离... # 在阿里云上实现云资源的微分段隔离 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2021%2F04%2Fmicro-segmentation-alibaba-cloud%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=%E5%9C%A8%E9%98%BF%E9%87%8C%E4%BA%91%E4%B8%8A%E5%AE%9E%E7%8E%B0%E4%BA%91%E8%B5%84%E6%BA%90%E7%9A%84%E5%BE%AE%E5%88%86%E6%AE%B5%E9%9A%94%E7%A6%BB&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2021%2F04%2Fmicro-segmentation-alibaba-cloud%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2021%2F04%2Fmicro-segmentation-alibaba-cloud%2F%3Flang%3Dzh-hans&title=%E5%9C%A8%E9%98%BF%E9%87%8C%E4%BA%91%E4%B8%8A%E5%AE%9E%E7%8E%B0%E4%BA%91%E8%B5%84%E6%BA%90%E7%9A%84%E5%BE%AE%E5%88%86%E6%AE%B5%E9%9A%94%E7%A6%BB&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/2021/04/micro-segmentation-alibaba-cloud/?lang=zh-hans&ts=markdown) [](mailto:?subject=在阿里云上实现云资源的微分段隔离) Link copied By [Daniel Ma](https://www.paloaltonetworks.com/blog/author/daniel-ma/?lang=zh-hans&ts=markdown "Posts by Daniel Ma") Apr 08, 2021 1 minutes [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) **首先我们来说说什么是微分段?** 英文名称叫做:**Micro-segmentation。** 从广义上讲,微分段(也称做"微隔离")就是一种更细粒度的网络隔离技术,主要面向虚拟化的数据中心,公有云和私有云平台,重点用于阻止攻击在进入企业数据中心网络内部后的横向平移(或者叫东西向移动),是软件定义安全的一种具体实践。 **那么为什么要做微分段?** 随着我们越来越多的核心企业应用放上了云端,包括应用主机,数据库,客户敏感数据等等,如何切实保护好这些应用、数据安全是一个重大的问题。 我们企业往往会在云或者企业的边界上部署NGFW来管控南北向的网络,应用流量,来做到集中的可视化和安全策略管控,来保护企业不受来自互联网的攻击。在云vpc内部,或者vpc之间往往是没有任何管控,默认的策略是允许访问,这是我们在过去十几年一般数据中心的常见模式。有些安全意识比较注重的,可能会在安全组里面进行一部分基于四层的管控,但是这是往往不够的。大家知道,其实大量的攻击都是需要基于七层的可视化和安全策略才能进行有效的防御。 大家可能会问,内部的流量我们默认是安全的,为什么需要进行管控,甚至进行七层的安全管理呢? 举个例子,下图是一个保护美国总统出行的图片分析。蓝色的线条表示我们企业在云上的边界,包括我们的边界NGFW(下一代防火墙)等一系列的安全产品,他用于隔离外部的人员进入。黄色的圆圈代表我们的安全监控系统,比如我们Palo Alto Networks的Prisma Cloud,Cortex等服务来进行安全态势管理和实时事件处理、优化,这里就不再展开。红色的线条框起来的就是就是我们的核心资产,也就是这里的重要保护对象 -- 总统。因为虽然隔离的外部人员进入,但是我们需要准备好以下情况: 1. 恐怖分子突破了第一条蓝色防线 -- 对应网络安全就是黑客通过各种手段突破了你的边界防护设备。 2. 早已经埋伏在总统身边的恐怖分子 -- 对应网络安全就是黑客已经控制了的某些内部主机,通过它来水平移动,盗取核心数据 所以我们需要图中绿色的额外防护措施来对核心资产进行额外保护,以解决以上的两个安全问题。也就是对我们在云中的核心敏感数据进行完全的内部保护,或者我们常常所说的实现零信任架构等等。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/Screenshot-2021-04-09-at-12.08.22-PM.png) 对于访问核心数据的流量我们需要做到,五个W,一个H,也就是: 1. Who - 谁来访问这个数据, 我们需要知道用户的身份ID,并不简单只是IP 地址,因为知道IP地址对我们安全管理人员去找出真正的访问人员太过麻烦。另外,IP地址也是动态变化的。所以,我们需要真正知道用户的身份,并且以此来进行安全管控 2. What - 你要访问的应用是什么 3. When - 指定允许访问的时间 4. Where - 访问的地址 5. Why - 策略的分类 6. How - 访问的具体内容是啥 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/Screenshot-2021-04-09-at-12.08.38-PM.png) 明白了微分段的重要性,我们如何来在阿里云上启用我们Palo Alto Networks的VM Series来进行防护呢?首先我们需要部署我们的VM Series 至一个Security VPC,这个VPC是用来对所有的业务VPC的流量进行管控的。我们的业务应用和数据分别部署在VPC1, VPC2,和VPC3中。我们需要实现VPC之间的流量我们需要根据以上五个W和一个H来进行管理,确保所有的VPC之间的流量也都是安全和可控的。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/Screenshot-2021-04-09-at-12.08.50-PM.png) 基于以上的架构,Palo Alto Networks与阿里云一起推出了阿里云东西向流量的安全防护最佳实践。通过阿里云的CEN以及最新的子网路由功能来非常方便的实现东西向流量的管控。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/Screenshot-2021-04-09-at-12.09.00-PM.png) 关于如何配置,可以参考阿里云最佳实践的2.3.4章节。 [https://bp.aliyun.com/detail/198](https://bp.aliyun.com/detail/198) ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/04/Screenshot-2021-04-09-at-12.09.09-PM.png) ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/04/QR-Code-WechatIMG1252.jpeg) 敬请关注Palo Alto Networks(派拓网络)官方微信账号 *** ** * ** *** ## Related Blogs ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### AI代理已經來臨,威脅也隨之而來](https://www.paloaltonetworks.com.au/blog/2025/05/ai-agents-threats/?lang=zh-hant) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Strata Copilot - 加速迈向自主网络安全的未来](https://www.paloaltonetworks.com.au/blog/network-security/strata-copilot/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 防火墙已死?至少本世纪不会!](https://www.paloaltonetworks.com.au/blog/2023/08/ngfw-is-not-dead-yet/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 面对性命攸关的时刻,如何实现可靠的医疗物联网安全](https://www.paloaltonetworks.com.au/blog/2022/12/medical-iot-security-to-depend-on/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 利用业界首创的 AIOps for NGFW 革新防火墙运行](https://www.paloaltonetworks.com.au/blog/2022/03/industry-first-aiops-for-ngfw/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Prisma Access 是保护远程用户安全的领先云服务](https://www.paloaltonetworks.com.au/blog/2021/08/prisma-access-leading-cloud-service-secure-remote-users/?lang=zh-hans) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language