From the course: CISSP Cert Prep (2021): 4 Communication and Network Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Security device placement

Security device placement

From the course: CISSP Cert Prep (2021): 4 Communication and Network Security

Start my 1-month free trial

Security device placement

- [Instructor] Security architects are not only responsible for selecting appropriate security controls, but they also must determine the best locations to place those controls on the network. And we've already talked about how network architects use firewalls to divide networks in the security zones. It's appropriate to place a firewall at any point in the network where you would like to enforce a network security boundary. In this example, the firewall sits at the network perimeter, separating an internal network and the DMZ from the internet. There could easily be more firewalls on the internal network. For example, we might place a firewall here to enforce separation between the end point network, wireless network, guest network and data center network. The exact placement of firewalls will depend upon your organization's security and business requirements. Many security controls are designed to collect information…

Contents