The Segmentation Blueprint: Designing, Deploying, and Scaling Network Segmentation for Modern Cyber Defense
- By Raghunath Kulkarni, Kaarthik Sivakumar, Renato Morais, Patrick Lloyd
- Published May 8, 2026 by Cisco Press.
Best Value Purchase
Book + eBook Bundle
- Your Price: $64.79
- List Price: $107.98
- Includes EPUB and PDF
- About eBook Formats
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Individual Purchases
eBook
- Your Price: $38.39
- List Price: $47.99
- Estimated Release: May 20, 2026
- Includes EPUB and PDF
- About eBook Formats
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
- Copyright 2026
- Dimensions: 7-3/8" x 9-1/8"
- Pages: 512
- Edition: 1st
- Book
- ISBN-10: 0-13-546236-3
- ISBN-13: 978-0-13-546236-2
The Segmentation Blueprint: Designing, Deploying, and Scaling Network Segmentation for Modern Cyber Defense
Modern cyber attacks dont stop at the perimeterthey move laterally. Network segmentation is one of the most effective ways to contain threats, reduce risk, and protect critical systems, but many organizations struggle to move from theory to execution.
The Segmentation Blueprint is a practical, business-aligned guide to designing, deploying, and evolving network segmentation in todays complex enterprise environments. Written for security architects, network engineers, CISOs, and technology leaders, this book shows how segmentation has evolved from traditional VLANs to modern micro- and nanosegmentation models that protect applications, workloads, APIs, and data across hybrid and multi-cloud networks.
Using a phased, real-world approach, the book helps readers assess segmentation maturity, align segmentation decisions with business objectives, and implement scalable architectures that limit lateral movement and reduce the blast radius of breaches. Drawing on enterprise-proven practices and Cisco-informed insights, it bridges strategy and implementationwithout locking readers into a single vendor.
Youll learn how to:
- Align segmentation strategy with business risk, compliance, and resilience goals
- Design segmentation architectures for modern, application-centric environments
- Understand and apply traditional segmentation, progressively adding in microsegmentation
- Measure effectiveness and continuously improve segmentation outcomes
Whether youre modernizing an existing network or building security into new architectures, The Segmentation Blueprint provides the clarity, structure, and tools needed to turn segmentation into a durable, scalable cyber defense strategy.
Table of Contents
Introduction xxiii
Chapter 1 The Segmentation Mindset 1
Pillars of Zero Trust 2
Policy and Governance 2
Identity 5
Vulnerability Management 8
Enforcement 9
Analytics 10
Beyond the Five Pillars 11
Addressing the Problem Head On: Why Do Segmentation Strategies Fail? 11
The Importance of the Team 13
Information Security 14
Network Engineering/Desktop Engineering 15
Network Security 15
Operations 16
Cross-Team Collaboration 17
Business Entities 18
Executive-Driven Vision 19
Other Considerations Beyond Standard Teams 19
Aligning Strategy and Tactics 21
Maturing in Segmentation Strategy 22
A Look Ahead 23
Summary 24
Reference 24
Chapter 2 Alignment with Business Outcomes 25
Identifying the Need for Segmentation in Modern Hybrid Networks 25
Patterns Driving Modern Hybrid Networks 27
Bring Your Own Device (BYOD) 27
Internet of Things (IoT) 28
Artificial Intelligence (AI) 29
Security Risks: A Hackers Playground 30
Compliance Mandates: The Regulatory Maze 33
Microsegmentation for Regulatory Compliance 34
Payment Card Industry Data Security Standard (PCI DSS) 35
9780135462362_print.indb 12 09/04/26 2:28 PM
Health Insurance Portability and Accountability Act (HIPAA) 37
General Data Protection Regulation (GDPR) 39
Performance, Scalability, and Adaptability 42
Operational Complexity: The Management Nightmare 43
Cloud and Multicloud Adoption: The Consistency Crisis 45
Developing a Segmentation Strategy 45
Reducing Risk via Organizational Perspectives 46
The Leadership Perspective 46
Strategic Oversight 47
Effort Versus Value 48
Resource Allocation 50
Policy Development 51
Risk Management 52
Stakeholder Engagement 53
Training and Awareness 54
Performance Metrics 54
Continuous Improvement 55
The Architects Perspective 56
Design and Planning 56
Integration and Alignment 58
Innovation and Adaptation 58
Collaboration and Communication 59
The Asset Management Perspective 60
The Network and Security Administrators Perspectives 61
The Application Development Perspective 63
Perspectives on Infrastructure, Network, Applications, and Automation 64
Roles and Responsibilities of the Application Team for Effective Segmentation 65
Bringing It All Together: An Actionable Segmentation Framework 66
Summary 68
References 69
Chapter 3 Developing a Segmentation Strategy 71
Cisco SAFE 72
How to Use Cisco SAFE 73
Capability Phase 75
Architecture Phase 77
Design Phase 82
The Foundations of Segmentation 85
Physical Segmentation 86
Logical Segmentation 87
Virtual Local Area Networks (VLANs) 87
Private VLANs (PVLANs) 90
Wireless SSID 92
Access Control List (ACL) 92
SD-Segmentation and Cisco TrustSec 94
Security Zones 97
Network Virtualization 99
Extending Network Segments with VXLAN 101
Session Layer Segmentation with QUIC 102
Segmentation as a Service in Public Cloud 105
Cloud-Native Segmentation 106
Kernel-Level Segmentation with eBPF 112
Segmentation Strategy and the Shared Responsibility Model 113
Summary 115
Chapter 4 Macrosegmentation 117
Gaining Visibility While Architecting Segmentation 118
Network Virtualization 120
An Overlay for an Overlay: VLANs 122
Achieving Macrosegmentation with Firewalls 123
Understanding Traditional Access Control Lists 124
Understanding Interface-Based Firewalls 125
Understanding Zone-Based Firewalls 126
Hybrid Mesh Firewall 127
Linking Concepts Together 130
Practical Macrosegmentation Policy Development 130
Segmentation Involves the Infrastructure but Is Really About the Endpoint 134
Mapping with Cisco SAFE Architecture 136
Campus: Securing Guest Wi-Fi Access in a Campus Network 136
Solution with Macrosegmentation Features 137
Conclusion 137
Branch: Protecting Payment Processing in a Branch Network 137
A Solution with Macrosegmentation Features 138
Conclusion 139
Data Center: Securing Remote Access in a Data Center 139
Solution with Macrosegmentation Features 140
Conclusion 140
Internet PIN: Securing SaaS Application Access in the Internet PIN 140
Solution with Macrosegmentation Features 141
Conclusion 141
Cloud PIN: Securing Workload Communication in a Cloud PIN 142
Solution with Macrosegmentation Features 142
Conclusion 143
Edge PIN: Securing IoT Endpoints in an Edge PIN 143
Solution with Macrosegmentation Features 143
Conclusion 145
Summary 145
References 145
Chapter 5 Microsegmentation 147
Benefits of Microsegmentation 148
Implementing Microsegmentation 148
Challenges in Implementing Microsegmentation 150
Microsegmentation in the Campus 152
Application Segmentation 153
Cloud-Native Segmentation Controls 154
Organizing Workloads 155
Segmentation 156
Applying Policies 157
Network Service Mesh 160
Automated Zero Trust Microsegmentation 160
Grouping Workloads 162
Organizing Workloads 164
Automating Scope Discovery 166
Critical Common Services 169
Providing Access to Scopes 170
Workload Information 170
Policies 171
Policy Creation 172
Policy Discovery 174
Measuring Segmentation 175
Achieving Microsegmentation with a Next-Generation Firewall 175
Seeing Through the Fog: Application Awareness 176
Knowing Whos at the Gate: User Identity Policies 177
Labeling the Landscape: Security Group Tags 178
Reading the Room: Context-Aware Policies 179
Cisco Secure Firewall: The Skilled Artisan 179
Applying More Granular Enforcement Mechanisms Closer to the Endpoint 182
Integration with Other Cisco Technologies for Enhanced Segmentation 186
Summary 188
References 188
Chapter 6 Building the Segmentation Fabric 189
Cisco SD-Access Components 190
Cisco Catalyst Center 190
Cisco Identity Services Engine 192
Operational Planes 195
LISP: The Overlay Control Plane 195
VXLAN: The Data Plane 195
Cisco TrustSec: The Policy Plane 196
Cisco Catalyst Center: The Management Plane 196
Architecture Components 197
Fabric 197
Underlay Network 197
Overlay Network 198
Shared Services 200
Fabric Roles 201
Control Plane Node 201
Edge Nodes 203
Intermediate Nodes 204
Border Nodes 204
Extended Nodes 208
Fabric WLCs 209
Fabric-Mode Access Points 210
SD-Access Embedded Wireless 210
Fabric in a Box 210
Transit Networks 211
Transit Control Plane Nodes 211
Fabric Site 212
SD-Access Design Strategy 212
Small Sites 213
Medium Sites 214
Large Sites 215
A Reference Model to Deploy SD-Access for Distributed Campus 217
Interconnecting Multiple Domains to Enable End-to-End Segmentation over the Internet 219
End-to-End Segmentation with Cisco SD-WAN 220
Cisco SD-WAN Design Considerations 223
Cisco Secure Access: Cloud-Based Security Controls with Context-Aware Policy Enforcement 224
Implementing Secure Private Access with Cisco Secure Access 226
Delivering Secure Internet Access with Cisco Secure Access 228
Achieving Seamless Segmentation Using Integrated Cisco Solutions 229
Summary 230
References 230
Chapter 7 Implementing Segmentation with Cisco Technology 231
Configuring Cisco Secure Firewalls for Segmentation 231
Application Visibility and Control (AVC) 231
User IdentityBased Policies 233
Integrating with Identity Services Engine 235
Expanding Integrations to Include Cisco Secure Workload 237
Using Context-Aware Policies 237
Configuring Cisco Identity Services and Switches for Segmentation 240
Configuring a Switch to Communicate to ISE 244
Configuring a Dynamic VLAN 245
Configuring a Downloadable ACL 246
Configuring TrustSec Tags 247
Assigning Policies to the TrustSec Matrix 251
Configuring Policies 255
Building the Network Inventory with Endpoint Profiling 256
Cisco AI Endpoint Analytics: Advanced Endpoint Classification 259
Achieving Consistency with ISE Data 263
Simplifying Multidomain Segmentation with Cisco ISE Common Policy 263
Introduction to Cisco ISE pxGrid 264
SXP: Enabling SGT Propagation Across the Network 265
Cisco ACI Integration: Extending Control into the Data Center 266
Public Cloud Integrations: Mapping Workload Context for Unified Policy Enforcement 268
CMDB Integration: Mapping the Unknowns 269
Cisco Cyber Vision Integration: Enhanced Visibility for Industrial Networks 270
Third-Party Integrations: Extending Visibility and Control with Specialized Solutions 271
Ordr: Endpoint Visibility and Behavioral Insights 272
Medigate: Optimizing Security in Healthcare Environments 272
Armis: Comprehensive Asset Security Across IoT and OT 273
Summary 273
References 274
Chapter 8 Segmenting Applications in the Data Center and Cloud 275
Zero Trust Microsegmentation with Cisco Secure Workload 275
Cisco Secure Workload First-Time User Experience 276
Visibility into Network Traffic Flows 280
Workload Profiles 284
Policies 284
Automated Policy Discovery Using AI 287
Measuring Segmentation Scores 289
Segmenting the Data Center with Cisco ACI 290
Components of an ACI Fabric 291
Physical Components 291
Logical Constructs (Policy Model) 292
Network-Centric Versus Application-Centric Topology 293
Network-Centric Topology 294
Application-Centric Topology 294
ACI Fabric Overlay 295
External Connectivity with L3Out 296
Connectivity with an SD-Access Fabric 297
ACI Fabric Communication Through a Catalyst SD-WAN Mesh 298
Virtual Machine Manager (VMM) Integration 299
Container Network Interface (CNI) Integration 303
Service Graphs for Advanced Security Inspections 305
Network Segmentation in ACI 306
Cisco Secure Workload and ACI 309
The Life of Packets in the End-to-End Segmented Network 312
Summary 315
Reference 316
Chapter 9 Validating Policies, Monitoring Enforcement, and Responding to Deviations 317
Cisco Secure Network Analytics: From Visibility Gaps to Actionable Intelligence 318
Components and Architecture 320
Flow Ingestion 322
Host Groups 327
Observations, Alerts, Security Events, and Alarms 330
Custom Security Events 334
Group Policies Monitoring 335
Response Management 336
Technical Adoption Roadmap 339
Cisco Secure Workload: Policy Validation with Live Policy Analysis 340
Summary 344
References 345
Chapter 10 Segmentation Maturity Model and Scorecard 347
What Is the Segmentation Maturity Model? 348
Using the Capability Maturity Model (CMM) for Segmentation 348
Level 1: Ad Hoc/Initial 349
Level 2: Repeatable/Managed 349
Level 3: Defined 350
Level 4: Quantitatively Managed 350
Level 5: Optimized 350
Segmentation Methods and the OSI Model 351
Threat Assessments 352
Factors That Trigger a Maturity Level Reassessment 353
Role-Based Perspectives 353
The Management and Senior Leadership Perspective 354
Strategic Oversight 354
Resource Allocation 354
Policy Development 355
Risk Management 355
Stakeholder Engagement 356
Training and Awareness 356
Performance Metrics 357
Continuous Improvement 357
Evaluating Leadership Effectiveness: A Scorecard Approach 358
Mapping the Scorecard and Evaluation Criteria with the SSMM 360
The Asset Management Perspective 362
Asset Inventory Management 363
Lifecycle Management 363
End-User Device Management 363
Infrastructure Device Management 364
Evaluating Asset Management Effectiveness 365
Mapping the Scorecard and Evaluation Criteria with the SSMM 367
The Architects Perspective 367
Design and Planning 368
Integration and Alignment 370
Innovation and Adaptation 372
Collaboration and Communication 374
Evaluating Architecture Effectiveness: A Scorecard Approach 375
Mapping the Scorecard and Evaluation Criteria with the SSMM 377
The Network and Security Administrators Perspective 378
Network Administrator Responsibilities 379
Design and Implementation 379
Configuration and Maintenance 380
Monitoring and Optimization 380
Integration Across Hybrid Environments 380
Security Administrator Responsibilities 381
Security Policy Enforcement 381
Threat Detection and Response 381
Identity and Access Management 382
Incident Management 382
Evaluating Network and Security Administrative Effectiveness: A Scorecard Approach 383
Alternative Approach 383
Mapping the Scorecard and Evaluation Criteria with the SSMM 390
Summary 392
Chapter 11 Reference Architecture 395
The Campus and Branch Domains 399
Use Case Example: Smart Hospital, Inc. 411
Progressing Beyond an Endpoint Focus 415
A Ubiquitous Experience for All 417
Beyond Campus and Branch 419
Identifying Segmentation Needs with Cisco SAFE 424
Building a Secure Architecture with Cisco SAFE 429
Previous Reference Architectures 430
Asset Identity Management, Asset Monitoring and Discovery, Configuration Management Database, and a Sound Provisioning or Onboarding Process 431
Authentication, Authorization, and Accounting (AAA), Certificate Authorities (CAs), and IP Address Management (IPAM) Systems 432
Traffic Visibility, Behavioral Analytics, Firewalls, Proxies, and DNS Security 433
Analytics, Logging, and Lessons Learned 433
Summary 434
References 435
Chapter 12 The Future of Segmentation 437
Core Elements of Segmentation 437
The Future Role of AI in Segmentation 438
Zero Trust: The Guiding Principle for Granular Segmentation 440
Identity as the New Perimeter 440
Contextual Awareness for Adaptive Access 440
Continuous Verification and Least Privilege 442
Microperimeters and Nanosegmentation 443
Data Privacy as a Segmentation Imperative 444
A Vision for the Future of Segmentation: Distributed Macrosegmentation and Microsegmentation with a Hybrid Mesh Firewall 445
The Impact on Nanosegmentation 450
Automation: Streamlining Segmentation Processes 450
The Impact of Cloud-Native and On-Premises Technologies 451
A Call to Action: Integration of Technologies 451
Summary 451
Reference 451
Appendix: Leadership Perspective Scorecard Approach 453
9780135462362 TOC 4/13/2026
- Request an Instructor or Media review copy.
- Corporate, Academic, and Employee Purchases
- International Buying Options
Other Things You Might Like
- Securing AI Using Zero Trust Principles
- Book $47.99