University Essay: Microsegmentation and Zero Trust Security Explained

Verified

Added on  2023/04/22

|4
|726
|260
Essay
AI Summary
This essay examines the concepts of microsegmentation and zero trust security in the context of cloud security. It begins by differentiating between physical network segmentation and microsegmentation, highlighting microsegmentation's enhanced security capabilities and increased bandwidth efficiency. The essay then defines zero trust security, emphasizing its departure from conventional models through strict identity verification and least privilege access. It explores how this model supports ubiquitous security in cloud environments and leverages microsegmentation to create granular security zones. The paper concludes that microsegmentation is a superior technique for enhancing cloud security and that zero trust security is essential for organizations to control and improve the security of their networks and data. The essay is based on research from various sources including Network World, CSO Online, and Cloudflare.
Document Page
MICRO SEGMENTATION AND ZERO TRUST SECURITY
0
Micro segmentation and Zero Trust
Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MICRO SEGMENTATION AND ZERO TRUST SECURITY
1
Micro segmentation and zero trust security
Micro segmentation is defined as a process which is used to produce secure zones in
the data base and cloud deployments which allow consumers to isolates the workloads and
secure them from hackers (Network world, 2018). The physical network segment is a
common method which is used to implement the recent Ethernet. This essay aim is to
compare the physical network segmentation and micro segmentation related to cloud security
and evaluate zero trust security.
The micro segmentation is an advanced version of the physical network segmentation
which is used to secure the cloud servers from hackers. In terms of security micro
segmentation is more secure rather than physical network segmentation. In physical network
segmentation the overall bandwidth in the LAN is reduced but in micro segmentation, the
rate of bandwidth is increased (Carrera, et al., 2015). Moreover, the micro segmentation
networks are more accurate and efficient rather than physical network segmentation. The
physical network segmentation can be performed with the current network devices but micro
segmentation cannot be performed with the network devices. it is observed that the micro
segmentation has the potential to enhance the security of network due to the notion of
persistence but physical network segmentation cannot provide better security.
The zero trust is defined as the security technique which is cantered on the belief that
companies should not trust anything inside or outside their perimeters. It is a type of model
which needs strict identity verification for each individual which try to access the personal
servers of the consumer (Cso Online, 2018). It is observed that this security model is different
from the conventional security model because it requires the complete verification of the
victim that enters into the organization network. Such kind of security model also supports
the ubiquitous security in the area of cloud computing by providing consumer only as much
Document Page
MICRO SEGMENTATION AND ZERO TRUST SECURITY
2
access to the network as they require. The fundamental concept of zero trusts is based on the
least privilege access and it reduces the consumer exposure to sensitive parts of the server. It
provides the multi factor authentication process to cloud computing which supports the
ubiquitous security.
The zero trust security models also use the micro segmentation topology which
divides security perimeters into small parts to maintain the access of the consumer servers.
Moreover, a consumer with access to one of the zone will not able to permission to access the
other zones which are done with the help of micro segmentation (Cloud flare, 2018). Today,
the modern organization requires for implementing the zero trust security process because it
is a more efficient and easy approach to control and monitor the security related issues.
Moreover, this model also helps modern organization for dividing the networks into small
zones and maintaining the security of private data and servers.
This essay explained the micro segmentation and zero trust security model and
compared the physical network segmentation with the micro segmentation. It is concluded
that micro segmentation is the best technique to increase the security of cloud computing and
organization networks. Zero trust security also helps companies to control and enhance the
security of private networks and data.
Document Page
MICRO SEGMENTATION AND ZERO TRUST SECURITY
3
References
Carrera, C. A., Lan, C., Escobar-Sanabria, D., Li, Y., Rudney, J., Aparicio, C., & Fok, A.
(2015). The use of micro-CT with image segmentation to quantify leakage in dental
restorations. Dental Materials, 31(4), 382-390.
Cloud flare (2018) what is zero trust security? Retrieved from:
https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/
Cso Online (2018) what is Zero Trust? A model for more effective security. Retrieved from:
https://www.csoonline.com/article/3247848/network-security/what-is-zero-trust-a-
model-for-more-effective-security.html
Network world (2018) what is micro segmentation? How getting granular improves network
security. Retrieved from:
https://www.networkworld.com/article/3247672/virtualization/what-is-
microsegmentation-how-getting-granular-improves-network-security.html
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]