CISSP · · 5 min read

Secure Network Design and Segmentation: Containing Attacks Before They Spread

Most breaches spread because networks are flat. Learn how to design segmentation that limits blast radius without breaking the business or your operations.

Hook / Why this matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Breaches rarely begin in the data center. They often start with a phished user, a vulnerable endpoint, or a partner connection. Segmentation is how you prevent a single compromised system from becoming a company wide incident. Done well, it is one of the most effective controls in Domain 4.

Core concept explained simply

Network segmentation is the practice of breaking your network into smaller, controlled zones and tightly managing how traffic flows between them. Instead of one large flat network where everything can talk to everything else, you design smaller areas with clear purposes and limited trust.

Segmentation, segregation, and isolation

These terms overlap but have useful distinctions:

In most enterprises, you will rely primarily on segmentation, with segregation and isolation reserved for very high value or high risk systems.

Building blocks: VLANs, subnets, and routing

Practical segmentation uses three main tools:

The important point is that simply creating multiple VLANs or subnets does not improve security unless you apply policies to control traffic between them.

DMZ patterns

A demilitarized zone (DMZ) is a network segment that hosts systems exposed to untrusted networks, usually the internet. Common patterns include:

DMZs are protected by firewalls on both sides, and rules should tightly control which systems and ports are allowed.

Separating user, server, and management networks

A foundational pattern for secure network design is to separate:

This separation means that a compromised user device does not automatically have direct Layer 2 or unrestricted Layer 3 access to critical servers or management consoles.

Micro segmentation and software defined networking

Micro segmentation extends the segmentation idea inside data centers and clouds at a finer level. Instead of one server subnet with broad access, you use software defined networking tools to apply policies between individual workloads or small groups.

Examples include:

In cloud environments, security groups and network security policies often act as micro segmentation tools.

Zero trust networking

Zero trust networking treats every connection as untrusted by default, regardless of network location. In practice, this means:

Segmentation is a key ingredient of zero trust, but identity, strong authentication, and continuous verification are just as important.

CISSP lens

For the CISSP exam, segmentation shows up in multiple ways:

Domain 4 questions often hide segmentation issues inside stories about outages, new applications, or partner connections. Train yourself to ask, "What should talk to what, and who decided that?".

Real-world scenario

A consulting firm allowed staff laptops, application servers, and management tools to share a small number of large VLANs. Firewalls protected the perimeter but there was almost no internal segmentation.

An employee fell for a phishing email that installed malware. The attacker used that foothold to:

Because there was no meaningful segmentation, only endpoint protections stood between the attacker and sensitive systems. Some servers lacked current endpoint agents, so the compromise went undetected for several days.

After the incident, the organization redesigned its network:

This design did not guarantee perfect security. It did ensure that the next compromised laptop would face multiple obstacles before reaching critical systems.

Common mistakes and misconceptions

Common pitfalls in segmentation include:

A CISSP should spot these patterns and advocate for simpler, more principled designs.

Actionable checklist

Use this checklist to assess and improve segmentation in your environment:

Key takeaways

Optional exam-style reflection question

Which design better protects an internal database that supports a public web application: placing the database in the DMZ with the web server, or placing it on an internal network reachable only from the web server? Why?

Answer: Placing the database on an internal network reachable only from the web server is more secure. The DMZ should contain only systems that must communicate directly with the internet. Keeping the database inside the internal network and limiting access to connections from the web server reduces exposure and limits lateral movement paths if the web server is compromised.

Read next

© 2025 Threat On The Wire. All rights reserved.