← Back to Blog

Security Starts With the Problem You’re Trying to Solve

data governancesecurity

Security Starts With the Problem You’re Trying to Solve

A healthcare analytics vendor perspective

In healthcare analytics, security conversations often jump straight to controls.

Network segmentation. VPNs. Private subnets. Reverse proxies. Zero trust.
All important. None of them are the starting point.

The starting point is always the same question:

What problem are we actually trying to solve?

In our world, that problem is usually some combination of:

Security is not about eliminating risk. It’s about managing failure responsibly.

Prevention vs Containment (and Why Healthcare Needs Both)

At a high level, security work falls into two buckets:

  1. Reducing the likelihood of compromise
  2. Reducing the impact of compromise

These get blurred constantly, but they solve different problems.

You can have excellent perimeter controls and still fail catastrophically if a compromised system can freely move laterally through your environment. In healthcare analytics, that lateral movement often means crossing boundaries you really care about: contracts, clients, and regulated data.

So instead of asking:

The better question is:

If this component is compromised, what else can it reach?

Risk Acceptance Is Architecture (Especially for Vendors)

Every architecture embeds a risk decision.

As a healthcare analytics vendor, those decisions often look like this:

It’s common to rely on:

All of that is good practice.

But none of it answers the most important downstream question:

Does a compromise in one client context increase risk for another?

If the answer is “yes,” then you’ve accepted cross-client blast radius, whether you intended to or not.

Where Network Segmentation Fits for Healthcare Analytics

Network segmentation (VPCs, subnets, VLANs, security groups) is not inherently “more secure.”

It becomes meaningful when combined with policy enforcement that limits communication paths.

In a healthcare analytics context, segmentation is typically used to enforce boundaries like:

This isn’t theoretical. This is how you make statements like:

“A compromise of this reporting service cannot access raw claims data.”

That statement only becomes true when the network enforces it.

An Example in Healthcare: Reporting UI Compromise

Imagine a vendor-hosted reporting application:

Now assume that application is compromised via:

The key question is not “Why did this happen?”

The key question is:

What can that compromised service reach next?

If it can:

Then the blast radius is no longer limited to one app. It’s systemic.

Segmentation plus firewall policy is how you turn a breach into:


VPNs, Private Access, and False Comfort

Many vendors rely heavily on VPNs or private access layers and feel comfortable skipping deeper segmentation.

That can be reasonable, but it’s still a risk decision.

VPNs answer:

“Who is allowed to connect?”

They do not answer:

“What can a compromised system reach once connected?”

“No known vulnerabilities” in VPN protocols is not a guarantee. It’s an assumption. Assumptions are fine, as long as they’re explicit and revisited.


Security Layers Solve Different Healthcare Problems

Each security layer addresses a specific failure mode:

None of these replace the others. And none are universally required.

They answer different questions.


Visualizing Attack Surface vs Blast Radius (Healthcare Context)

flowchart LR
    Internet -->|TLS / MFA| RP[Reverse Proxy]
    RP --> App[Client Reporting App]

    subgraph Prevention [Attack Surface Reduction]
        RP
        TLS[TLS]
        MFA[MFA]
        GEO[Geo / IP Controls]
    end

    App -->|Compromise| Host[Application Host]

    subgraph Containment [Blast Radius Reduction]
        FW[Firewall Policy]
        SEG[Network Segmentation]
        ISO[Container / VM Isolation]
    end

    Host --> FW --> SEG

    SEG -->|Allowed| ClientA[Client A Data]
    SEG -->|Blocked| ClientB[Client B Data]
    SEG -->|Blocked| ETL[ETL Pipelines]
    SEG -->|Blocked| Admin[Admin Systems]