Chapter 6: Network and Security Architecture

Learning Objectives

After completing this chapter, you will be able to:

  • Design secure network architectures with appropriate segmentation
  • Implement defense-in-depth security strategies
  • Apply Zero Trust architecture principles
  • Configure network security controls effectively
  • Design encryption strategies for data protection
  • Implement identity and access management best practices
  • Design network connectivity for hybrid and multi-cloud environments

Introduction

Network and security architecture form the protective foundation of infrastructure. A well-designed network enables connectivity while limiting blast radius when incidents occur. Security architecture ensures that infrastructure protects organizational assets against evolving threats.

This chapter covers network design principles, security architecture patterns, and the controls necessary to protect modern infrastructure environments.


Network Architecture Fundamentals

Network Design Principles

PrincipleDescriptionImplementation
SegmentationDivide networks to contain threatsVLANs, subnets, security zones
Least ConnectivityOnly allow necessary connectionsDefault deny, explicit allow
Defense in DepthMultiple security layersPerimeter, network, host controls
VisibilityMonitor all network trafficFlow logs, packet capture, SIEM
SimplicityMinimize complexityStandard patterns, documentation
ResilienceNo single points of failureRedundant paths, failover

Network Segmentation

Divide networks into segments to contain threats and control traffic flow:

┌─────────────────────────────────────────────────────────────────────────────┐
│                    ENTERPRISE NETWORK SEGMENTATION                           │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│                              INTERNET                                        │
│                                  │                                           │
│                                  ▼                                           │
│                    ┌─────────────────────────┐                              │
│                    │     Edge Firewall       │                              │
│                    │   WAF │ DDoS │ IPS      │                              │
│                    └───────────┬─────────────┘                              │
│                                │                                             │
│  ┌─────────────────────────────┼─────────────────────────────────┐          │
│  │                         DMZ ZONE                               │          │
│  │  ┌─────────────┐  ┌─────────────┐  ┌─────────────┐            │          │
│  │  │ Load        │  │ Reverse     │  │ Bastion     │            │          │
│  │  │ Balancers   │  │ Proxy       │  │ Hosts       │            │          │
│  │  └─────────────┘  └─────────────┘  └─────────────┘            │          │
│  └─────────────────────────────┬─────────────────────────────────┘          │
│                                │                                             │
│                    ┌───────────┴───────────┐                                │
│                    │   Internal Firewall    │                                │
│                    └───────────┬───────────┘                                │
│                                │                                             │
│  ┌────────────────┬────────────┼────────────┬─────────────────┐             │
│  │                │            │            │                 │             │
│  ▼                ▼            ▼            ▼                 ▼             │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────────┐       │
│ │   WEB    │ │   APP    │ │   DATA   │ │   MGMT   │ │   SHARED     │       │
│ │   ZONE   │ │   ZONE   │ │   ZONE   │ │   ZONE   │ │   SERVICES   │       │
│ ├──────────┤ ├──────────┤ ├──────────┤ ├──────────┤ ├──────────────┤       │
│ │ • Web    │ │ • App    │ │ • DBs    │ │ • Jump   │ │ • DNS        │       │
│ │   Servers│ │   Servers│ │ • Cache  │ │   Boxes  │ │ • Directory  │       │
│ │ • CDN    │ │ • APIs   │ │ • Storage│ │ • SIEM   │ │ • LDAP       │       │
│ │   Origin │ │ • Workers│ │ • Backup │ │ • Logging│ │ • NTP        │       │
│ └──────────┘ └──────────┘ └──────────┘ └──────────┘ └──────────────┘       │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Zone-Based Architecture

ZonePurposeAccess RulesExamples
Public/EdgeInternet-facing entry pointsRestricted inbound, monitoredCDN, WAF, DDoS protection
DMZBuffer between public and privateControlled bidirectionalLoad balancers, reverse proxies
ApplicationApplication workloadsInternal access onlyApp servers, APIs, microservices
DataDatabases and storageHighly restrictedDatabases, file storage, caches
ManagementAdministrative and monitoringPrivileged access onlyJump boxes, SIEM, monitoring
Shared ServicesCommon infrastructureControlled from all zonesDNS, directory, NTP

VPC/Virtual Network Design

ComponentPurposeBest Practices
CIDR PlanningIP address allocationPlan for growth, avoid overlaps with on-premises
SubnetsNetwork segmentsPublic and private subnets per AZ
Route TablesTraffic routingExplicit routes, default deny
NAT GatewayOutbound internet for private subnetsHighly available, multi-AZ
Internet GatewayInbound internet accessAttach to VPC, use with public subnets
VPC PeeringConnect VPCsNon-overlapping CIDRs, transitive routing considerations
Transit GatewayHub-and-spoke connectivityCentralize routing, simplify architecture

VPC Architecture Example:

┌─────────────────────────────────────────────────────────────────────────────┐
│                         VPC ARCHITECTURE                                     │
│                         CIDR: 10.0.0.0/16                                   │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  ┌────────────────────────────────────────────────────────────────────┐     │
│  │                    AVAILABILITY ZONE A                              │     │
│  │  ┌──────────────────┐  ┌──────────────────┐  ┌──────────────────┐  │     │
│  │  │ Public Subnet    │  │ Private Subnet   │  │ Data Subnet      │  │     │
│  │  │ 10.0.0.0/24      │  │ 10.0.10.0/24     │  │ 10.0.20.0/24     │  │     │
│  │  │ • NAT Gateway    │  │ • App Servers    │  │ • RDS Primary    │  │     │
│  │  │ • Bastion Host   │  │ • EKS Nodes      │  │ • ElastiCache    │  │     │
│  │  └──────────────────┘  └──────────────────┘  └──────────────────┘  │     │
│  └────────────────────────────────────────────────────────────────────┘     │
│                                                                              │
│  ┌────────────────────────────────────────────────────────────────────┐     │
│  │                    AVAILABILITY ZONE B                              │     │
│  │  ┌──────────────────┐  ┌──────────────────┐  ┌──────────────────┐  │     │
│  │  │ Public Subnet    │  │ Private Subnet   │  │ Data Subnet      │  │     │
│  │  │ 10.0.1.0/24      │  │ 10.0.11.0/24     │  │ 10.0.21.0/24     │  │     │
│  │  │ • NAT Gateway    │  │ • App Servers    │  │ • RDS Standby    │  │     │
│  │  │ • ALB Nodes      │  │ • EKS Nodes      │  │ • ElastiCache    │  │     │
│  │  └──────────────────┘  └──────────────────┘  └──────────────────┘  │     │
│  └────────────────────────────────────────────────────────────────────┘     │
│                                                                              │
│  ┌────────────────────────────────────────────────────────────────────┐     │
│  │                    AVAILABILITY ZONE C                              │     │
│  │  ┌──────────────────┐  ┌──────────────────┐  ┌──────────────────┐  │     │
│  │  │ Public Subnet    │  │ Private Subnet   │  │ Data Subnet      │  │     │
│  │  │ 10.0.2.0/24      │  │ 10.0.12.0/24     │  │ 10.0.22.0/24     │  │     │
│  │  │ • NAT Gateway    │  │ • App Servers    │  │ • RDS Read       │  │     │
│  │  │ • ALB Nodes      │  │ • EKS Nodes      │  │   Replica        │  │     │
│  │  └──────────────────┘  └──────────────────┘  └──────────────────┘  │     │
│  └────────────────────────────────────────────────────────────────────┘     │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Security Architecture

Defense in Depth

Multiple layers of security controls protect against different attack vectors:

┌─────────────────────────────────────────────────────────────────────────────┐
│                        DEFENSE IN DEPTH LAYERS                               │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │ LAYER 1: PERIMETER                                                   │    │
│  │ • DDoS Protection (Shield, Cloudflare)                               │    │
│  │ • Web Application Firewall (WAF)                                     │    │
│  │ • CDN with security features                                         │    │
│  │ • Rate limiting, bot protection                                      │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │ LAYER 2: NETWORK                                                     │    │
│  │ • Segmentation (VPCs, subnets, security groups)                      │    │
│  │ • Network ACLs                                                       │    │
│  │ • Network firewall/IDS/IPS                                           │    │
│  │ • VPN, Private Link, Direct Connect                                  │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │ LAYER 3: IDENTITY                                                    │    │
│  │ • IAM policies (least privilege)                                     │    │
│  │ • Multi-factor authentication                                        │    │
│  │ • SSO and federation                                                 │    │
│  │ • Privileged access management                                       │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │ LAYER 4: COMPUTE                                                     │    │
│  │ • Hardened AMIs/images                                               │    │
│  │ • Patch management                                                   │    │
│  │ • Endpoint protection                                                │    │
│  │ • Vulnerability scanning                                             │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │ LAYER 5: APPLICATION                                                 │    │
│  │ • Secure coding practices                                            │    │
│  │ • Input validation                                                   │    │
│  │ • Authentication and authorization                                   │    │
│  │ • API security                                                       │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │ LAYER 6: DATA                                                        │    │
│  │ • Encryption at rest and in transit                                  │    │
│  │ • Data classification                                                │    │
│  │ • Access controls                                                    │    │
│  │ • Data loss prevention                                               │    │
│  │ • Backup and recovery                                                │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Zero Trust Architecture

Principles:

PrincipleDescriptionImplementation
Never Trust, Always VerifyNo implicit trust based on network locationAuthenticate all access requests
Least Privilege AccessMinimum necessary permissionsRole-based access, just-in-time access
Assume BreachDesign for compromise containmentMicro-segmentation, blast radius limits
Explicit VerificationVerify user, device, and contextMFA, device compliance, conditional access
Continuous ValidationOngoing authentication and authorizationSession management, anomaly detection

Zero Trust Architecture Components:

┌─────────────────────────────────────────────────────────────────────────────┐
│                        ZERO TRUST ARCHITECTURE                               │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │                    POLICY DECISION POINT                             │    │
│  │  • Identity verification    • Device compliance                      │    │
│  │  • Context evaluation       • Policy enforcement                     │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                   │                                          │
│                                   ▼                                          │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │                    POLICY ENFORCEMENT POINT                          │    │
│  │  • API Gateway              • Service Mesh                           │    │
│  │  • Reverse Proxy            • Identity-Aware Proxy                   │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                   │                                          │
│       ┌───────────────┬──────────┴──────────┬───────────────┐               │
│       │               │                      │               │               │
│       ▼               ▼                      ▼               ▼               │
│  ┌─────────┐    ┌─────────┐           ┌─────────┐    ┌─────────┐           │
│  │ Service │    │ Service │           │ Service │    │  Data   │           │
│  │    A    │    │    B    │           │    C    │    │  Store  │           │
│  └─────────┘    └─────────┘           └─────────┘    └─────────┘           │
│                                                                              │
│  Supporting Components:                                                      │
│  • Identity Provider (IdP)     • Threat Intelligence                        │
│  • Device Management           • Security Analytics                         │
│  • Encryption Services         • Audit Logging                              │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Network Security Controls

Security Group vs NACL Comparison

AspectSecurity GroupsNetwork ACLs
ScopeInstance/ENI levelSubnet level
StateStatefulStateless
RulesAllow onlyAllow and deny
ProcessingAll rules evaluatedRules processed in order
DefaultDeny all inbound, allow all outboundAllow all
Use CaseFine-grained instance controlSubnet-level blocking

Security Control Implementation

ControlLayerPurposeExamples
WAFApplicationProtect web appsAWS WAF, Cloudflare, Azure WAF
FirewallNetworkControl traffic flowAWS Network Firewall, Palo Alto
Security GroupsInstanceInstance-level firewallCloud-native SGs
NACLsSubnetSubnet-level controlsStateless allow/deny
IDS/IPSNetworkIntrusion detection/preventionSuricata, Snort
DLPDataPrevent data leakageSymantec, Digital Guardian

Firewall Rules Best Practices

PracticeDescription
Default DenyBlock all traffic by default, explicitly allow
Least PrivilegeOnly allow necessary ports and protocols
Specific SourcesAvoid 0.0.0.0/0 except for public services
DocumentationComment rules with purpose and ticket number
Regular ReviewAudit rules quarterly, remove unused
LoggingLog denied traffic for analysis

Encryption Standards

Data at Rest Encryption

Data TypeEncryption MethodKey Management
Storage VolumesAES-256Provider or customer-managed keys
DatabasesTDE (Transparent Data Encryption)Database-native or KMS
Object StorageServer-side encryptionSSE-S3, SSE-KMS, SSE-C
BackupsEncrypted at sourceInherit from source or separate key
ArchivesLong-term encrypted storageKey retention planning

Data in Transit Encryption

Connection TypeEncryption StandardMinimum Version
External WebTLS1.2 (prefer 1.3)
Internal ServicesTLS/mTLS1.2
Database ConnectionsTLS1.2
VPNIPSecIKEv2
Direct ConnectMACsec or VPN overlayLayer 2/3 encryption

Key Management Architecture

┌─────────────────────────────────────────────────────────────────────────────┐
│                        KEY MANAGEMENT ARCHITECTURE                           │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │                    KEY MANAGEMENT SERVICE (KMS)                      │    │
│  │  • Key creation and storage    • Key rotation                        │    │
│  │  • Access policies             • Audit logging                       │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                   │                                          │
│           ┌───────────────────────┼───────────────────────┐                 │
│           │                       │                       │                 │
│           ▼                       ▼                       ▼                 │
│  ┌─────────────────┐    ┌─────────────────┐    ┌─────────────────┐         │
│  │  Customer       │    │   Service       │    │    HSM          │         │
│  │  Managed Keys   │    │   Keys          │    │    Keys         │         │
│  │  (CMK)          │    │   (AWS Managed) │    │    (CloudHSM)   │         │
│  └────────┬────────┘    └────────┬────────┘    └────────┬────────┘         │
│           │                      │                      │                   │
│           └──────────────────────┴──────────────────────┘                   │
│                                  │                                          │
│                                  ▼                                          │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │                    DATA ENCRYPTION KEYS (DEK)                        │    │
│  │  Generated per-resource, encrypted with CMK (envelope encryption)    │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Identity and Access Management

IAM Principles

PrincipleDescriptionImplementation
Least PrivilegeMinimum necessary permissionsStart with no permissions, add as needed
Separation of DutiesPrevent single point of controlMultiple approvals for critical actions
Just-in-Time AccessTemporary elevated permissionsTime-limited access, approval workflow
Regular ReviewPeriodic access certificationQuarterly access reviews
Strong AuthenticationMulti-factor authenticationMFA required for all access

IAM Architecture

ComponentPurposeExamples
Identity ProviderUser authenticationOkta, Azure AD, Google Workspace
FederationConnect identity systemsSAML, OIDC
IAM ServiceCloud resource authorizationAWS IAM, Azure RBAC, GCP IAM
PAMPrivileged access managementCyberArk, HashiCorp Vault
SSOSingle sign-onCentralized authentication

Role-Based Access Control (RBAC)

Role TypeScopeUse Case
Organization RolesAcross organizationBilling admin, security auditor
Account RolesSingle accountAccount admin, developer
Service RolesSpecific serviceEC2 admin, S3 read-only
Resource RolesSpecific resourcesDatabase admin for specific DB

Hybrid and Multi-Cloud Connectivity

Connectivity Options

OptionBandwidthLatencySecurityUse Case
Site-to-Site VPNUp to 1.25 GbpsVariableEncrypted tunnelDevelopment, backup
Direct Connect1-100 GbpsLow, consistentPrivate connectionProduction workloads
ExpressRoute50 Mbps - 10 GbpsLowPrivate connectionAzure connectivity
Cloud Interconnect10-100 GbpsLowPrivate connectionGCP connectivity
SD-WANVariableOptimizedEncrypted overlayMultiple locations

Hub-and-Spoke Network Architecture

┌─────────────────────────────────────────────────────────────────────────────┐
│                        HUB-AND-SPOKE ARCHITECTURE                            │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│                    ┌─────────────────────────────────┐                      │
│                    │           HUB VPC               │                      │
│                    │  ┌─────────────────────────┐    │                      │
│                    │  │    Transit Gateway      │    │                      │
│                    │  └───────────┬─────────────┘    │                      │
│                    │              │                   │                      │
│                    │  ┌───────────┴─────────────┐    │                      │
│                    │  │    Shared Services      │    │                      │
│                    │  │  • Firewall             │    │                      │
│                    │  │  • DNS                  │    │                      │
│                    │  │  • NAT                  │    │                      │
│                    │  │  • VPN Endpoint         │    │                      │
│                    │  └─────────────────────────┘    │                      │
│                    └───────────────┬─────────────────┘                      │
│                                    │                                         │
│         ┌──────────────┬───────────┼───────────┬──────────────┐             │
│         │              │           │           │              │             │
│         ▼              ▼           │           ▼              ▼             │
│  ┌────────────┐ ┌────────────┐    │    ┌────────────┐ ┌────────────┐       │
│  │ Production │ │    Dev     │    │    │  Staging   │ │  Security  │       │
│  │    VPC     │ │    VPC     │    │    │    VPC     │ │    VPC     │       │
│  └────────────┘ └────────────┘    │    └────────────┘ └────────────┘       │
│                                   │                                         │
│                                   │                                         │
│                    ┌──────────────┴──────────────┐                          │
│                    │     On-Premises Network     │                          │
│                    │  via Direct Connect / VPN   │                          │
│                    └─────────────────────────────┘                          │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Security Monitoring and Detection

Security Monitoring Components

ComponentPurposeExamples
SIEMSecurity event correlationSplunk, Elastic, Sentinel
Flow LogsNetwork traffic analysisVPC Flow Logs, NSG Flow Logs
CloudTrail/Activity LogsAPI activity loggingAWS CloudTrail, Azure Activity Log
Threat DetectionAutomated threat identificationGuardDuty, Defender
Vulnerability ScanningIdentify vulnerabilitiesInspector, Qualys, Tenable

Security Logging Requirements

Log TypeRetentionPurpose
Authentication Logs2+ yearsAccess audit, incident investigation
API/CloudTrail Logs1+ yearChange tracking, compliance
Flow Logs90 daysNetwork forensics
Application Logs90 daysApplication security events
Security Tool Logs1+ yearThreat detection history

Compliance and Standards

Security Frameworks

FrameworkFocusRequirements
CIS BenchmarksHardeningConfiguration baselines
NIST 800-53FederalComprehensive controls
ISO 27001Information SecurityManagement system
SOC 2Service OrganizationsTrust principles
PCI DSSPayment CardsCard data protection
HIPAAHealthcarePHI protection

Compliance Controls Mapping

Control AreaCISNISTPCIImplementation
Access Control5.xAC-x7.x, 8.xIAM, MFA, RBAC
Encryption3.xSC-x3.4, 4.xTLS, KMS, encryption
Logging6.xAU-x10.xCloudTrail, SIEM
Network4.xSC-x1.xSegmentation, firewalls
Vulnerability7.xRA-56.x, 11.xScanning, patching

Review Questions

  1. Network Segmentation: Design a network segmentation strategy for a company with web applications, internal applications, databases, and a management network. What zones would you create and what traffic would you allow between them?

  2. Zero Trust: A company wants to implement Zero Trust. They currently have a perimeter-based security model with VPN access. What steps would you recommend to transition to Zero Trust?

  3. Encryption Strategy: Design an encryption strategy for a healthcare application that stores PHI. What data would you encrypt, what encryption methods would you use, and how would you manage keys?

  4. Security Group Design: You have a three-tier web application (web, app, database). Design the security group rules for each tier. What ports would you allow, and from which sources?

  5. Hybrid Connectivity: A company needs to connect their on-premises data center to AWS with consistent, low-latency connectivity for database replication. What connectivity option would you recommend?

  6. Incident Detection: How would you design a security monitoring architecture to detect a compromised EC2 instance that is exfiltrating data?


Key Takeaways

  • Network segmentation limits blast radius and enables granular access control
  • Defense in depth provides multiple security layers—no single point of failure
  • Zero Trust assumes no implicit trust, verifying every access request
  • Encryption protects data at rest and in transit—use TLS 1.2+ minimum
  • Key management is critical—use KMS with proper access controls
  • IAM follows least privilege—start with no permissions, add as needed
  • Monitoring and detection enable rapid response to security incidents

Summary

Network and security architecture form the foundation of infrastructure protection. Effective security requires defense in depth with multiple layers of controls, Zero Trust principles that verify every access request, proper encryption for data protection, and comprehensive monitoring for threat detection.

The patterns and controls in this chapter apply across deployment models and cloud providers. The key is applying them consistently and comprehensively, following the principle that security is everyone’s responsibility.


Chapter Navigation


Back to top

Infrastructure and Platform Management Handbook - MIT License