Today I will talk about Network Security Zoning some of its properties and examples.
A security zone is an area within a network that consists of a group of systems and other components with the same characteristics, all of which serve to manage a secure network environment.
Also Read:- How to Hack Android Phone in 2019
The network security zoning mechanism allows an organization to efficiently manage a secure network environment by selecting the appropriate level of security for different zones of Internet and intranet networks, It also enforces the organization’s Internet security policies, according to the origin of the Web content and helps in effectively monitoring and controlling inbound and outbound traffic.
Properties of security zone:
- Active security policies that enforce rules on the traffic in transit (traffic that can pass through the firewall) and the action to be taken against it
- pre-defined screening options and block the malicious traffic
- Address book (IP addresses and address sets) to recognize members, So that, policies can be applied
- List of the interface in the zone
Examples of the network security zone include:
You need to understand some basic terms to understand and know about the network security zone.
Internet zone: The Internet zone, also known as the untrusted zone, is the part of the internet outside the boundaries of an organization. It is highly susceptible to security breaches, as there may be little or no security controls that can block an invasion.
Internet DMZ: The Internet DMZ (“demilitarize zone“; also called a controlled zone) is a controlled, Internet-facing zone that typically contains Internet-facing components of network web servers and email gateways through which the employe of the organization directly communicate. It acts as a barrier between the organization’s private network and the public network. The DMZ use firewall each of the two gateway which enables to control of:
- Traffic entering the host in DMZ from the host
- The traffic leaving from the hosts in a DMZ to the Internet
- Traffic entering the host in a DMZ from internal (private) network
- The traffic leaving from the host in DMZ to internal networks
The security controller can install the software in the DMZ to monitor and control user access.
Production Network zone: The production network zone, also known as a restrict zone, supports functions for which access should be limited. It strictly controls direct access from uncontrolled networks. Typically, a restricted zone employs one or more firewalls to filter inbound and outbound traffic.
Intranet Zone: The Intranet zone is also known as the controlled zone, contains a set of hosts in an organization’s network located behind a single firewall or set of firewalls, and generally has a less restriction. This zone is not heavily restricted in use, but it has an appropriate span of control set up to ensure that network traffic does not compromise the operation of significant business functions.
Management Network Zone or Secured Zone: Access to this zone is limited to authorized users. Access to one area of the zone does not necessarily apply to another area of the zone. It is a secured zone with strict policies.
Also Read:- The Security Triangle (Security Model)
That’s it for today if you need more information about anything you can comment below we will help you.