mirror of
https://github.com/kamranahmedse/developer-roadmap.git
synced 2025-08-01 06:50:26 +02:00
add real examples about segmentations (#6897)
* Update src/data/roadmaps/cyber-security/content/perimiter-vs-dmz-vs-segmentation@PUgPgpKio4Npzs86qEXa7.md --------- Co-authored-by: dsh <daniel.s.holdsworth@gmail.com>
This commit is contained in:
@@ -22,3 +22,8 @@ To implement a DMZ in your network, you can use devices such as firewalls, route
|
||||
- Perimeter segmentation involves isolating an organization's internal networks from the untrusted external network, typically using security appliances such as firewalls, IDS, and IPS.
|
||||
- DMZ segmentation involves creating a separate, secure area within the network for hosting public-facing services that need to be accessible to external users while maintaining additional security for internal assets.
|
||||
- Implementing proper network segmentation and security policies can significantly reduce the risk of data breaches and other security threats.
|
||||
|
||||
Learn more from the following resources:
|
||||
|
||||
- [@opensource@Best practice for network segmentation](https://github.com/sergiomarotco/Network-segmentation-cheat-sheet)
|
||||
- [@opensource@OWASP Network segmentation Cheat Sheet](https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Network_Segmentation_Cheat_Sheet.md#network-segmentation-cheat-sheet)
|
Reference in New Issue
Block a user