Zone Architecture

1.Untrusted Zone

    + External Systems (not owned by organization)

        + Internet ,Public data classification

2.Semi-trusted (DMZ)

    + Externally-Exposed systems.

       + Public data classification

    + 3rd party Exposed system

        + Business partner systems 

3.Audit Zone

    + Regulatory compliance

    + Security logging

    + Security Monitoring (SIEM)

4.Sub-zones

    + Zones divided into subzones

        + span global sites

    + Special cases

        + Regulatory mandated


 

 

Post a Comment

0 Comments