Glossary

Zone-Based Security

Network architecture with separated zones based on trust level and sensitivity.

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

Z

Zone-based security is a network architecture approach that divides the network into distinct zones or segments based on trust levels, data sensitivity and functional requirements. Each zone has its own security policies and access controls, with traffic between zones strictly regulated by firewalls, access control lists and other enforcement points. Common zones include the public-facing DMZ, internal corporate networks, sensitive data enclaves and management networks.

Implementing zone-based security limits the potential impact of a breach by containing threats within a single zone and preventing lateral movement across the network. It provides a structured approach to applying the principle of defence in depth, where multiple layers of controls protect the most sensitive assets. Whilst Zero-Trust Architecture is increasingly favoured for modern environments, zone-based security remains a practical and widely deployed strategy, particularly in organisations with legacy infrastructure or strict regulatory requirements for network segregation.