Granular security strategy employed to isolate workloads, applications, and/or environments
Microsegmentation
The smallest possible reduction in the attack surface
Protect Surface
Boundary that defines the protect surface
Microperimeter
Security approach that eliminates implicit trust
Zero trust
Term used to describe flow within a datacenter
East-West traffic