Infrastructure Security · IS-Q13B

Bonus Question: Has the organization defined and implemented a network security architecture with clear segmentation and trust boundaries?

Why This Matters

Network segmentation and zoning form the backbone of resilient infrastructure. Properly structured trust boundaries prevent lateral movement, contain threats, and align with zero-trust principles.

Maturity

0 — Unaware
Flat network; no segmentation or documentation.
1 — Ad Hoc
Basic VLANs or firewall rules configured informally.
2 — Defined
Documented network diagram with identified zones (internal, DMZ, external).
3 — Managed
Segmentation policy enforced; changes approved via formal workflow.
4 — Integrated
Zero-trust or micro-segmentation controls applied and continuously monitored.
5 — Optimized
Architecture reviewed quarterly against threat models with automated validation.

How to Level Up

| From → To | Actions | |—|—| | 0 → 1 |Map subnets and assets; draw baseline diagram.| | 1 → 2 |Define network zones and document traffic rules.| | 2 → 3 |Implement change management and rule review workflows.| | 3 → 4 |Apply zero-trust and network access control (NAC).| | 4 → 5 |Automate segmentation verification and drift detection.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

| Purpose | Tool | Notes | |—|—|—| | Diagramming | Draw.io / Diagrams.net | Maintain live topology maps | | Audit | Nipper / FirePlotter | Review firewall configurations | | Validation | Zeek / Wireshark | Check zone isolation |

Common Pitfalls

Compliance Mapping

| Standard | Clauses / Notes | |—|—| | ISO/IEC 27001:2022 | A.8.23 (Network Security) | | CERT-In 2022 | Section 16 (Network Design & Segregation) | | DPDP Act 2023 | Sec 9 (Data Safeguards for Flow Control) | | NIST CSF 2.0 | PR.AC-05 / PR.PT-01 | | NIRMATA Mapping | IS-Q13B extends Infrastructure Security to include advanced network segmentation and trust-boundary design. |