CISSP · · 4 min read

Cloud and Hybrid Network Connectivity: Extending Your Network Without Extending Your Risk

Your network now spans data centers and clouds. Learn how to connect them securely using VPNs, private links, and segmented routing without creating one big flat attack surface.

Hook / Why this matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Most enterprise networks no longer live in a single data center. They span offices, cloud providers, SaaS platforms, and partner environments. Poorly designed connectivity can turn a contained cloud incident into an enterprise wide event, or allow on premises compromises to reach cloud workloads easily.

Core concept explained simply

Cloud and hybrid connectivity is about linking your networks to those you run in the cloud, and to those of partners and providers. The goal is to enable necessary communication without creating one flat, borderless network.

Common connectivity patterns

Several patterns show up repeatedly:

Each pattern affects how traffic flows, where you can inspect it, and how much trust passes between environments.

Cloud virtual networks

Major cloud providers offer constructs similar to traditional networking:

The same principles apply: segment workloads, control flows between segments, and manage routing deliberately.

Hub and spoke vs full mesh

Hybrid designs commonly use:

From a security perspective, hub and spoke designs usually make it easier to centralize inspection and control. Full mesh designs can become complex and hard to reason about.

Shared responsibility in the network context

Cloud connectivity operates under shared responsibility:

Assuming that the provider handles all network security is a common and dangerous misconception.

Hybrid identity and access

Network connectivity is only part of the story. Identity and access controls must span environments.

A secure design combines network level restrictions with strong identity based controls.

CISSP lens

For Domain 4, you should be able to:

Exam questions may present scenarios where a flat hybrid network exposes both cloud and on premises systems. You should identify segmentation and restricted routing as key mitigations.

Real-world scenario

A company moved several applications to a public cloud provider. To simplify access, they created a site to site VPN from their data center to the cloud and allowed broad routing between networks.

Over time, more systems were added in both environments. The VPN became a de facto bridge between two large, relatively flat networks.

When a cloud based virtual machine was compromised through an exposed management port, the attacker:

The investigation revealed that security group rules and routing allowed much broader connectivity than necessary.

In response, the company redesigned its connectivity:

The new design made it significantly harder for a compromise in one environment to spread to the other.

Common mistakes and misconceptions

Typical issues in cloud and hybrid connectivity include:

A CISSP should promote designs that treat each environment as a separate security domain connected through controlled, monitored links.

Actionable checklist

To improve cloud and hybrid connectivity security:

Key takeaways

Optional exam-style reflection question

An organization wants to connect its on premises data center to a cloud VPC to support a new application tier. What is the primary security concern if they simply allow full routing between the two networks?

Answer: Full routing creates a large, flat hybrid network where a compromise in either environment can easily spread to the other. Least privilege routing and segmentation should be used so that only the specific systems and ports required for the application can communicate across the link.

Read next

© 2025 Threat On The Wire. All rights reserved.