5.9 Network Isolation Security Zones

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 48 minutes
Video Transcription
all right. So
as we get a little bit more specific and talk about thes security zones again, the bottom line is trusted from untrusted. Now you may have different layers or levels of trust. That's fine, many of us doing our organization. But ultimately, that's what the's security zones are all about.
So I like this idea of a managed boundary. Every security zone provides that
boundary between different level of trust, and we want to get a specific and his Grand Mueller's we can when we are allowing access. You know, with the premise of the first step
is access right, regardless of what type of manipulation you do just being ableto access a secure network right there, you bring in a very powerful threat. So access being very specific
on those management planes that we've talked about those management zones, if you will, making sure Onley privileged access
has access to the zone. In of itself
manage the inner zone communication through secure protocols, make sure we've got policies, procedure standards and guidelines that govern the configuration. You know, from the very architecture of how we create this, the zones, why we create zones,
what we used to protect one's own from another.
Usually this is based on CIA meetings, like I said, often focused on confidentiality.
Um, head down at the bottom. You see the little puzzle pieces with security. We want to protect what we have. That's proactive.
But if proactive protection doesn't work, then we want to detect very quickly, and we want to be able to contain Well, if you have small, independent zones, containment is much easier
as his detection as his protection. Right? It's easier just to protect a small subset of secure computers,
then detect any sort of compromise and then containment. So thes security zones were really important.
Um, again, you know, I'm not going to read this here. Detection monitoring is the key to detection. Reviewing audit logs proactively checking for malicious activity through ivy s systems.
Using your SIM systems to coordinate and consolidate aggregate information across the zones.
Use your security devices as you would physical networks.
All right. And then, of course, containment. Making sure that in this area, if there is some sort of malicious activity, were ableto isolate that
making sure that we control traffic from what goes in and what goes out right. Bi directional communication is always gonna be a consideration as well
Up Next
Certified Cloud Security Professional (CCSP)

This Certified Cloud Security Professional (CCSP) certification course covers topics across six domains, to ensure the candidate has a wide range of competencies and is capable in the assessment and implementation of cloud service solutions.

Instructed By