FV-Fracture: Emergency Network Severance
When a breach is detected, every second of continued connectivity is a second the attacker uses to spread. Fracture physically disconnects network segments within seconds, stopping lateral movement by removing the paths it depends on.
Control Module
A firewall rule is a suggestion. Physical disconnection is a fact. When you need containment, you need certainty.
<90s
From authorised command to complete physical disconnection
Zero
Network paths remaining after Fracture activation
100%
Containment assurance — no logical bypass possible
Multi-zone
Simultaneous severance across all configured boundaries
Software-based containment fails when attackers control the software.
Firewall Rule Delays
Emergency firewall changes require rule creation, testing, and propagation across multiple devices. Attackers move faster than change management processes allow.
VLAN Hopping
Logical network segmentation can be bypassed through VLAN hopping, ARP spoofing, and misconfigured trunk ports. The separation exists only when every configuration is perfect.
Compromised Controls
If the attacker has reached the management plane, they can modify or disable the same firewall rules and network segmentation you are relying on for containment.
The Scenario
Scenario: Sub-Minute Ransomware Containment
A SOC analyst detects ransomware encryption beginning on a file server at 02:14. The malware is spreading across network segments through SMB shares and has already reached two of four sites. Traditional containment would require isolating VLANs, pushing firewall rules, and disabling switch ports — a process that takes 15-30 minutes while the encryption continues. With Fracture, the SOC analyst issues a single authorised command. Within 90 seconds, all inter-site connections and inter-segment paths are physically severed. The ransomware has no network path to reach the remaining two sites. Encrypted segments are physically isolated for forensic analysis while clean segments begin recovery from air-gapped copies.
"We practised our containment playbook quarterly. It took 22 minutes to execute under ideal conditions. Fracture did it in 87 seconds with no room for human error."
Emergency containment that attackers cannot bypass.
FV-Fracture is the emergency response module of Firevault Control. It provides physical network severance within seconds, absolute containment with no logical bypass, and controlled restoration through the Relay module. When every second counts, Fracture provides the certainty that software-based containment cannot.
- Physical disconnection that stops all lateral movement
- Multi-party authorisation preventing accidental activation
- Sub-minute severance across all configured zones
- Automated SIEM integration for machine-speed response
- Controlled, individual path restoration during recovery
- Tamper-proof logging of all containment actions
Fracture — How It Works
Module 1 of 4Fracture physically removes network connections between configured zones. When activated, the paths between segments cease to exist. There is no firewall to bypass, no VLAN to hop, no configuration to exploit. The physical connection is removed until authorised personnel re-establish it.
Key Capabilities
Sub-Minute Severance
Physical disconnection of all configured network zones completes within 90 seconds of an authorised command, regardless of network size or complexity.
Absolute Containment
No logical bypass is possible. The physical connection between network segments is removed, making lateral movement impossible regardless of the attacker's privilege level.
Multi-Party Authorisation
Fracture activation requires authorisation from multiple designated parties, preventing accidental or malicious activation by a single compromised account.
Automated Trigger Integration
Fracture can be triggered automatically by SIEM alerts, SOC playbooks, or custom detection rules, reducing response time from human reaction speed to machine speed.
Full Event Logging
Every activation, the identity of authorising parties, and all subsequent path changes are recorded on tamper-proof, physically disconnected storage.
Controlled Restoration
After containment, paths are restored individually through the Relay module with multi-party authorisation, ensuring no cross-contamination during recovery.
Demo to Live
Adoption Guide
Zone Boundary Mapping
Identify every network boundary where emergency severance would be required during an incident, mapping inter-site, inter-segment, and external connections.
Authorisation Framework
Define the multi-party authorisation requirements, automated trigger conditions, and escalation procedures for Fracture activation.
Tabletop and Live Test
Conduct tabletop exercises followed by live severance tests on non-production segments to validate response times and restoration procedures.
Production Deployment
Deploy across all configured zones with SIEM integration, automated triggers for high-confidence detections, and quarterly live testing.
Zone Boundary Mapping
Identify every network boundary where emergency severance would be required during an incident, mapping inter-site, inter-segment, and external connections.
Authorisation Framework
Define the multi-party authorisation requirements, automated trigger conditions, and escalation procedures for Fracture activation.
Tabletop and Live Test
Conduct tabletop exercises followed by live severance tests on non-production segments to validate response times and restoration procedures.
Production Deployment
Deploy across all configured zones with SIEM integration, automated triggers for high-confidence detections, and quarterly live testing.
Questions
Frequently Asked
Ready to take the next step?
See how Control can govern your data paths with physical enforcement no software exploit can bypass.