Chapter 6

Segmentation

Chapter Key Points

  • The OSI model is commonly used to describe application of discovery and enforcement mechanisms within the network stack. A brief summary of the OSI model is provided in this chapter.

  • Segmentation can take many forms and is typically a layered enforcement model. Both upper layer segmentation models as well as network-centric segmentation models may lend themselves to the success of an organization’s segmentation goals.

  • Segmentation can be applied in a “north-south” or “east-west” manner. The determination of which is best for an organization is based on three key questions to be asked of the organization or business unit related to its segmentation journey.

  • Segmentation can be applied throughout network ...

Get Zero Trust Architecture now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.