Secure Network Zones

  • Peter Kai Wimmer


Large networks, which are often distributed over physically separate locations, require a coherent security approach. This paper introduces the concept of secure network zones, arranged in “onion-like” layers, providing increasing security levels towards the inner, more secure zones.

Increased security is provided by both protective layers around sensitive networks and additional (cumulative) security measures, ranging from basic measures such as hardening and firewalls to more sophisticated techniques such as intrusion detection and encryption of transmitted and stored data.

The implementation of secure network zones is described, including classification of data, assignment of applica-tions to zones, and data flow. A path for the migration of existing environments is discussed and recommendations for special use cases are provided.


Intrusion Detection System Access Control Mechanism Access Control List Secure Zone Mitre Corporation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Bell, David Elliott and La Padula, Leonard J.: Secure Computer Systems: Mathematical Foundations. MITRE Corporation, 1973.Google Scholar
  2. Bell, David Elliott and La Padula, Leonard J.: Secure Computer System: Unified Exposition and Mul-tics Interpretation. MITRE Corporation, 1976.Google Scholar
  3. Landwehr, C.E., C.L. Heitmeyer, and J. McLean, “A Security Model for Military Message Systems,” ACM Trans. on Computer Systems Vol. 9, No. 3 (Aug. 1984), pp. 198-222.CrossRefGoogle Scholar
  4. Zeltser, Lenny: Firewalls, Perimeter Protection, and VPNs. GCFW Practical Assignment, SANS, December 2000, p. 13-35.Google Scholar
  5. Zeltser, Lenny: Firewall Deployment for Multitier Applications., informIT, April 5, 2002.
  6. Buecker, Axel; Carreno, Ana Veronica; Field, Norman; Hockings, Christopher; Kawer, Daniel; Mo-hanty, Sujit; Monteiro, Guilherme: Enterprise Security Architecture. IBM Redbook, IBM International Technical Support Organization, August 2007, p. 29-39.Google Scholar

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH 2010

Authors and Affiliations

  • Peter Kai Wimmer
    • 1
  1. 1.atsec information security GmbHMunichGermany

Personalised recommendations