Device Placement
Every network is different– There are often similarities
* Firewalls– Separate trusted from untrusted– Provide additional security checks
* Other services may require their own security technologies– Honeypots, jump server, load balancers, sensors
Security Zones
Zone-based security technologies– More flexible (and secure) than IP address ranges
* Each area of the network is associated with a zone– Trusted, untrusted– Internal, external– Inside, Internet, Servers, Databases, Screened
* This simplifies security policies– Trusted to Untrusted– Untrusted to Screened– Untrusted to Trusted
Attack surface
Connectivity
Security zones (see example in notes)