larger cover

Register your product to gain access to bonus material or receive a coupon.

The Segmentation Blueprint: Designing, Deploying, and Scaling Network Segmentation for Modern Cyber Defense

Best Value Purchase

Book + eBook Bundle

  • Your Price: $64.79
  • List Price: $107.98
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Individual Purchases

Book

  • Your Price: $47.99
  • List Price: $59.99
  • Estimated Release: May 8, 2026

eBook

  • Your Price: $38.39
  • List Price: $47.99
  • Estimated Release: May 20, 2026
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

  • Description
  • Sample Content
  • Updates
  • Copyright 2026
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 512
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-546236-3
  • ISBN-13: 978-0-13-546236-2

The Segmentation Blueprint: Designing, Deploying, and Scaling Network Segmentation for Modern Cyber Defense

Modern cyber attacks dont stop at the perimeterthey move laterally. Network segmentation is one of the most effective ways to contain threats, reduce risk, and protect critical systems, but many organizations struggle to move from theory to execution.

The Segmentation Blueprint is a practical, business-aligned guide to designing, deploying, and evolving network segmentation in todays complex enterprise environments. Written for security architects, network engineers, CISOs, and technology leaders, this book shows how segmentation has evolved from traditional VLANs to modern micro- and nanosegmentation models that protect applications, workloads, APIs, and data across hybrid and multi-cloud networks.

Using a phased, real-world approach, the book helps readers assess segmentation maturity, align segmentation decisions with business objectives, and implement scalable architectures that limit lateral movement and reduce the blast radius of breaches. Drawing on enterprise-proven practices and Cisco-informed insights, it bridges strategy and implementationwithout locking readers into a single vendor.

Youll learn how to:

  • Align segmentation strategy with business risk, compliance, and resilience goals
  • Design segmentation architectures for modern, application-centric environments
  • Understand and apply traditional segmentation, progressively adding in microsegmentation
  • Measure effectiveness and continuously improve segmentation outcomes

Whether youre modernizing an existing network or building security into new architectures, The Segmentation Blueprint provides the clarity, structure, and tools needed to turn segmentation into a durable, scalable cyber defense strategy.

Table of Contents

Introduction xxiii
Chapter 1 The Segmentation Mindset 1
Pillars of Zero Trust 2
    Policy and Governance 2
    Identity 5
    Vulnerability Management 8
    Enforcement 9
    Analytics 10
Beyond the Five Pillars 11
Addressing the Problem Head On: Why Do Segmentation Strategies Fail? 11
    The Importance of the Team 13
    Information Security 14
    Network Engineering/Desktop Engineering 15
    Network Security 15
    Operations 16
    Cross-Team Collaboration 17
    Business Entities 18
    Executive-Driven Vision 19
    Other Considerations Beyond Standard Teams 19
Aligning Strategy and Tactics 21
Maturing in Segmentation Strategy 22
A Look Ahead 23
Summary 24
Reference 24
Chapter 2 Alignment with Business Outcomes 25
Identifying the Need for Segmentation in Modern Hybrid Networks 25
Patterns Driving Modern Hybrid Networks 27
    Bring Your Own Device (BYOD) 27
    Internet of Things (IoT) 28
    Artificial Intelligence (AI) 29
Security Risks: A Hackers Playground 30
Compliance Mandates: The Regulatory Maze 33
    Microsegmentation for Regulatory Compliance 34
    Payment Card Industry Data Security Standard (PCI DSS) 35
    9780135462362_print.indb 12 09/04/26 2:28 PM
    Health Insurance Portability and Accountability Act (HIPAA) 37
    General Data Protection Regulation (GDPR) 39
Performance, Scalability, and Adaptability 42
Operational Complexity: The Management Nightmare 43
Cloud and Multicloud Adoption: The Consistency Crisis 45
Developing a Segmentation Strategy 45
Reducing Risk via Organizational Perspectives 46
    The Leadership Perspective 46
        Strategic Oversight 47
        Effort Versus Value 48
        Resource Allocation 50
        Policy Development 51
        Risk Management 52
        Stakeholder Engagement 53
        Training and Awareness 54
        Performance Metrics 54
        Continuous Improvement 55
    The Architects Perspective 56
        Design and Planning 56
        Integration and Alignment 58
        Innovation and Adaptation 58
        Collaboration and Communication 59
    The Asset Management Perspective 60
    The Network and Security Administrators Perspectives 61
    The Application Development Perspective 63
    Perspectives on Infrastructure, Network, Applications, and Automation 64
    Roles and Responsibilities of the Application Team for Effective Segmentation 65
    Bringing It All Together: An Actionable Segmentation Framework 66
Summary 68
References 69
Chapter 3 Developing a Segmentation Strategy 71
Cisco SAFE 72
    How to Use Cisco SAFE 73
    Capability Phase 75
    Architecture Phase 77
    Design Phase 82
The Foundations of Segmentation 85
    Physical Segmentation 86
    Logical Segmentation 87
        Virtual Local Area Networks (VLANs) 87
        Private VLANs (PVLANs) 90
        Wireless SSID 92
        Access Control List (ACL) 92
        SD-Segmentation and Cisco TrustSec 94
        Security Zones 97
        Network Virtualization 99
        Extending Network Segments with VXLAN 101
        Session Layer Segmentation with QUIC 102
        Segmentation as a Service in Public Cloud 105
        Cloud-Native Segmentation 106
        Kernel-Level Segmentation with eBPF 112
Segmentation Strategy and the Shared Responsibility Model 113
Summary 115
Chapter 4 Macrosegmentation 117
Gaining Visibility While Architecting Segmentation 118
Network Virtualization 120
An Overlay for an Overlay: VLANs 122
Achieving Macrosegmentation with Firewalls 123
    Understanding Traditional Access Control Lists 124
    Understanding Interface-Based Firewalls 125
    Understanding Zone-Based Firewalls 126
    Hybrid Mesh Firewall 127
    Linking Concepts Together 130
Practical Macrosegmentation Policy Development 130
Segmentation Involves the Infrastructure but Is Really About the Endpoint 134
Mapping with Cisco SAFE Architecture 136
    Campus: Securing Guest Wi-Fi Access in a Campus Network 136
        Solution with Macrosegmentation Features 137
        Conclusion 137
    Branch: Protecting Payment Processing in a Branch Network 137
        A Solution with Macrosegmentation Features 138
        Conclusion 139
    Data Center: Securing Remote Access in a Data Center 139
        Solution with Macrosegmentation Features 140
        Conclusion 140
    Internet PIN: Securing SaaS Application Access in the Internet PIN 140
        Solution with Macrosegmentation Features 141
        Conclusion 141
    Cloud PIN: Securing Workload Communication in a Cloud PIN 142
        Solution with Macrosegmentation Features 142
        Conclusion 143
    Edge PIN: Securing IoT Endpoints in an Edge PIN 143
        Solution with Macrosegmentation Features 143
        Conclusion 145
Summary 145
References 145
Chapter 5 Microsegmentation 147
Benefits of Microsegmentation 148
Implementing Microsegmentation 148
Challenges in Implementing Microsegmentation 150
Microsegmentation in the Campus 152
Application Segmentation 153
    Cloud-Native Segmentation Controls 154
        Organizing Workloads 155
        Segmentation 156
        Applying Policies 157
        Network Service Mesh 160
    Automated Zero Trust Microsegmentation 160
        Grouping Workloads 162
        Organizing Workloads 164
        Automating Scope Discovery 166
        Critical Common Services 169
        Providing Access to Scopes 170
        Workload Information 170
Policies 171
    Policy Creation 172
    Policy Discovery 174
Measuring Segmentation 175
Achieving Microsegmentation with a Next-Generation Firewall 175
    Seeing Through the Fog: Application Awareness 176
    Knowing Whos at the Gate: User Identity Policies 177
    Labeling the Landscape: Security Group Tags 178
    Reading the Room: Context-Aware Policies 179
    Cisco Secure Firewall: The Skilled Artisan 179
Applying More Granular Enforcement Mechanisms Closer to the Endpoint 182
Integration with Other Cisco Technologies for Enhanced Segmentation 186
Summary 188
References 188
Chapter 6 Building the Segmentation Fabric 189
Cisco SD-Access Components 190
    Cisco Catalyst Center 190
    Cisco Identity Services Engine 192
Operational Planes 195
    LISP: The Overlay Control Plane 195
    VXLAN: The Data Plane 195
    Cisco TrustSec: The Policy Plane 196
    Cisco Catalyst Center: The Management Plane 196
Architecture Components 197
    Fabric 197
    Underlay Network 197
    Overlay Network 198
    Shared Services 200
Fabric Roles 201
    Control Plane Node 201
    Edge Nodes 203
    Intermediate Nodes 204
    Border Nodes 204
    Extended Nodes 208
    Fabric WLCs 209
    Fabric-Mode Access Points 210
    SD-Access Embedded Wireless 210
    Fabric in a Box 210
    Transit Networks 211
    Transit Control Plane Nodes 211
    Fabric Site 212
SD-Access Design Strategy 212
    Small Sites 213
    Medium Sites 214
    Large Sites 215
    A Reference Model to Deploy SD-Access for Distributed Campus 217
Interconnecting Multiple Domains to Enable End-to-End Segmentation over the Internet 219
    End-to-End Segmentation with Cisco SD-WAN 220
        Cisco SD-WAN Design Considerations 223
    Cisco Secure Access: Cloud-Based Security Controls with Context-Aware Policy Enforcement 224
        Implementing Secure Private Access with Cisco Secure Access 226
        Delivering Secure Internet Access with Cisco Secure Access 228
Achieving Seamless Segmentation Using Integrated Cisco Solutions 229
Summary 230
References 230
Chapter 7 Implementing Segmentation with Cisco Technology 231
Configuring Cisco Secure Firewalls for Segmentation 231
    Application Visibility and Control (AVC) 231
    User IdentityBased Policies 233
    Integrating with Identity Services Engine 235
    Expanding Integrations to Include Cisco Secure Workload 237
    Using Context-Aware Policies 237
Configuring Cisco Identity Services and Switches for Segmentation 240
    Configuring a Switch to Communicate to ISE 244
    Configuring a Dynamic VLAN 245
    Configuring a Downloadable ACL 246
    Configuring TrustSec Tags 247
    Assigning Policies to the TrustSec Matrix 251
    Configuring Policies 255
Building the Network Inventory with Endpoint Profiling 256
Cisco AI Endpoint Analytics: Advanced Endpoint Classification 259
Achieving Consistency with ISE Data 263
    Simplifying Multidomain Segmentation with Cisco ISE Common Policy 263
    Introduction to Cisco ISE pxGrid 264
    SXP: Enabling SGT Propagation Across the Network 265
    Cisco ACI Integration: Extending Control into the Data Center 266
    Public Cloud Integrations: Mapping Workload Context for Unified Policy Enforcement 268
    CMDB Integration: Mapping the Unknowns 269
    Cisco Cyber Vision Integration: Enhanced Visibility for Industrial Networks 270
    Third-Party Integrations: Extending Visibility and Control with Specialized Solutions 271
        Ordr: Endpoint Visibility and Behavioral Insights 272
        Medigate: Optimizing Security in Healthcare Environments 272
        Armis: Comprehensive Asset Security Across IoT and OT 273
Summary 273
References 274
Chapter 8 Segmenting Applications in the Data Center and Cloud 275
Zero Trust Microsegmentation with Cisco Secure Workload 275
    Cisco Secure Workload First-Time User Experience 276
    Visibility into Network Traffic Flows 280
    Workload Profiles 284
    Policies 284
    Automated Policy Discovery Using AI 287
    Measuring Segmentation Scores 289
Segmenting the Data Center with Cisco ACI 290
    Components of an ACI Fabric 291
        Physical Components 291
        Logical Constructs (Policy Model) 292
    Network-Centric Versus Application-Centric Topology 293
        Network-Centric Topology 294
        Application-Centric Topology 294
    ACI Fabric Overlay 295
    External Connectivity with L3Out 296
    Connectivity with an SD-Access Fabric 297
    ACI Fabric Communication Through a Catalyst SD-WAN Mesh 298
    Virtual Machine Manager (VMM) Integration 299
    Container Network Interface (CNI) Integration 303
    Service Graphs for Advanced Security Inspections 305
    Network Segmentation in ACI 306
Cisco Secure Workload and ACI 309
The Life of Packets in the End-to-End Segmented Network 312
Summary 315
Reference 316
Chapter 9 Validating Policies, Monitoring Enforcement, and Responding to Deviations 317
Cisco Secure Network Analytics: From Visibility Gaps to Actionable Intelligence 318
    Components and Architecture 320
    Flow Ingestion 322
    Host Groups 327
    Observations, Alerts, Security Events, and Alarms 330
    Custom Security Events 334
    Group Policies Monitoring 335
    Response Management 336
    Technical Adoption Roadmap 339
Cisco Secure Workload: Policy Validation with Live Policy Analysis 340
Summary 344
References 345
Chapter 10 Segmentation Maturity Model and Scorecard 347
What Is the Segmentation Maturity Model? 348
    Using the Capability Maturity Model (CMM) for Segmentation 348
        Level 1: Ad Hoc/Initial 349
        Level 2: Repeatable/Managed 349
        Level 3: Defined 350
        Level 4: Quantitatively Managed 350
        Level 5: Optimized 350
    Segmentation Methods and the OSI Model 351
    Threat Assessments 352
    Factors That Trigger a Maturity Level Reassessment 353
Role-Based Perspectives 353
    The Management and Senior Leadership Perspective 354
        Strategic Oversight 354
        Resource Allocation 354
        Policy Development 355
        Risk Management 355
        Stakeholder Engagement 356
        Training and Awareness 356
        Performance Metrics 357
        Continuous Improvement 357
        Evaluating Leadership Effectiveness: A Scorecard Approach 358
        Mapping the Scorecard and Evaluation Criteria with the SSMM 360
    The Asset Management Perspective 362
        Asset Inventory Management 363
        Lifecycle Management 363
        End-User Device Management 363
        Infrastructure Device Management 364
        Evaluating Asset Management Effectiveness 365
        Mapping the Scorecard and Evaluation Criteria with the SSMM 367
    The Architects Perspective 367
        Design and Planning 368
        Integration and Alignment 370
        Innovation and Adaptation 372
        Collaboration and Communication 374
        Evaluating Architecture Effectiveness: A Scorecard Approach 375
        Mapping the Scorecard and Evaluation Criteria with the SSMM 377
    The Network and Security Administrators Perspective 378
        Network Administrator Responsibilities 379
        Design and Implementation 379
        Configuration and Maintenance 380
        Monitoring and Optimization 380
        Integration Across Hybrid Environments 380
        Security Administrator Responsibilities 381
        Security Policy Enforcement 381
        Threat Detection and Response 381
        Identity and Access Management 382
        Incident Management 382
        Evaluating Network and Security Administrative Effectiveness: A Scorecard Approach 383
        Alternative Approach 383
        Mapping the Scorecard and Evaluation Criteria with the SSMM 390
Summary 392
Chapter 11 Reference Architecture 395
The Campus and Branch Domains 399
    Use Case Example: Smart Hospital, Inc. 411
    Progressing Beyond an Endpoint Focus 415
    A Ubiquitous Experience for All 417
Beyond Campus and Branch 419
Identifying Segmentation Needs with Cisco SAFE 424
Building a Secure Architecture with Cisco SAFE 429
Previous Reference Architectures 430
    Asset Identity Management, Asset Monitoring and Discovery, Configuration Management Database, and a Sound Provisioning or Onboarding Process 431
    Authentication, Authorization, and Accounting (AAA), Certificate Authorities (CAs), and IP Address Management (IPAM) Systems 432
    Traffic Visibility, Behavioral Analytics, Firewalls, Proxies, and DNS Security 433
    Analytics, Logging, and Lessons Learned 433
Summary 434
References 435
Chapter 12 The Future of Segmentation 437
Core Elements of Segmentation 437
The Future Role of AI in Segmentation 438
Zero Trust: The Guiding Principle for Granular Segmentation 440
    Identity as the New Perimeter 440
    Contextual Awareness for Adaptive Access 440
    Continuous Verification and Least Privilege 442
    Microperimeters and Nanosegmentation 443
Data Privacy as a Segmentation Imperative 444
A Vision for the Future of Segmentation: Distributed Macrosegmentation and Microsegmentation with a Hybrid Mesh Firewall 445
The Impact on Nanosegmentation 450
Automation: Streamlining Segmentation Processes 450
The Impact of Cloud-Native and On-Premises Technologies 451
A Call to Action: Integration of Technologies 451
Summary 451
Reference 451
Appendix: Leadership Perspective Scorecard Approach 453


9780135462362    TOC   4/13/2026

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.