November 2026network segmentation

Network Segmentation: The Complete Compliance Guide for SOC 2, PCI DSS, HIPAA, and ISO 27001

Implement network segmentation that satisfies SOC 2, PCI DSS, HIPAA, and ISO 27001 auditors. Covers micro-segmentation, VLANs, zero trust, and cloud-native approaches.

By QuickTrust EditorialUpdated 2026-03-19

Network Segmentation: The Complete Compliance Guide for SOC 2, PCI DSS, HIPAA, and ISO 27001

A flat network is a compliance auditor's red flag and an attacker's gift. When every system can reach every other system without restriction, a single compromised workstation can traverse the entire environment -- from developer laptops to production databases to cardholder data environments to systems storing protected health information. It is the network architecture equivalent of storing every key to every room in a single unlocked drawer.

Network segmentation -- the practice of dividing a network into isolated zones with controlled access between them -- is not a nice-to-have security enhancement. It is an explicit or implicit requirement of every major compliance framework: PCI DSS mandates it for scope reduction, SOC 2 expects it under logical access controls, HIPAA requires it as part of technical safeguards for electronic protected health information (ePHI), and ISO 27001 addresses it directly in Annex A control A.8.22. NIST treats it as a foundational element of information flow enforcement under AC-4.

Yet network segmentation remains one of the most poorly implemented controls in the companies we work with. Organizations either have no segmentation at all, have segmentation on paper that does not match reality, or have legacy segmentation that has degraded over years of uncontrolled changes. The result is audit findings, failed penetration tests, and -- in the worst cases -- breaches that spread far beyond their initial foothold because nothing stopped them.

This guide covers network segmentation end to end: what it is, why compliance frameworks require it, how to implement it across traditional and cloud-native environments, how to validate it, and how to document it for auditors. Whether you are building segmentation from scratch or remediating findings from a failed audit, this is the reference you need.


What Is Network Segmentation?

Network segmentation is the practice of dividing a computer network into smaller, distinct sub-networks (segments) and enforcing access controls between them. Each segment contains systems with similar functions, trust levels, or data sensitivity classifications. Traffic between segments must pass through a controlled enforcement point -- a firewall, router ACL, security group, or similar mechanism -- where policies determine what traffic is allowed and what is denied.

The purpose of segmentation

Network segmentation serves three core objectives:

1. Limiting blast radius. When an attacker compromises a system, segmentation constrains how far they can move laterally. If your web servers are in one segment and your database servers containing sensitive customer data are in another, compromising a web server does not automatically grant network access to the database tier. The attacker must find a way through the enforcement point between segments -- and that is where your monitoring, logging, and alerting detect the attempt.

2. Reducing compliance scope. This is where segmentation delivers its most measurable business value. In PCI DSS, for example, every system that can communicate with the cardholder data environment (CDE) is in scope for the audit. Proper segmentation can take a 500-system environment and reduce the in-scope systems to 30 -- cutting audit cost, complexity, and timeline by 80% or more.

3. Enforcing least privilege at the network layer. Segmentation is the network-level implementation of the principle of least privilege. Systems should only be able to communicate with the other systems they need to communicate with -- and nothing else. Your marketing analytics platform does not need network access to your payment processing infrastructure. Segmentation ensures it cannot reach it.

The evolution from flat networks

A flat network is one where all systems exist in the same broadcast domain with unrestricted communication between them. In the early days of enterprise networking, flat networks were common because they were simple to manage. As organizations grew, the limitations became dangerous:

  • No containment. A worm, ransomware, or lateral movement attack could traverse the entire network without encountering any barrier.
  • Unbounded compliance scope. Every system on the flat network is potentially in scope for every compliance framework, because every system can reach every other system.
  • No visibility. Without segmentation boundaries, there are no natural enforcement points where traffic can be inspected, logged, and analyzed.

The evolution has moved through several phases: from physical separation (separate hardware for separate networks), to VLANs (logical separation on shared hardware), to firewall-enforced zones, to software-defined networking (SDN), to micro-segmentation (per-workload isolation), and now to zero trust architectures that assume no network location is inherently trusted.


Why Compliance Frameworks Require Network Segmentation

Network segmentation is not a discretionary control. Every major compliance framework either explicitly requires it or implicitly mandates it through access control and data protection requirements that cannot be satisfied without it.

PCI DSS: Requirements 1.3 and 4.1 -- Scope Reduction

PCI DSS is the most explicit about network segmentation. The standard does not technically "require" segmentation -- it is possible to pass a PCI DSS audit on a flat network. But doing so means your entire network is in scope. Every system, every workstation, every server must meet every applicable PCI DSS requirement. For any non-trivial organization, this is cost-prohibitive and operationally unsustainable.

PCI DSS v4.0 addresses segmentation through several requirements:

  • Requirement 1.2 mandates that network security controls (NSCs) are configured and maintained, with specific requirements for managing rules, reviewing configurations, and ensuring that NSCs restrict traffic between trusted and untrusted networks.
  • Requirement 1.3 requires that network access to and from the cardholder data environment is restricted. This is the segmentation requirement: systems that do not need access to the CDE must not have access to the CDE.
  • Requirement 1.4 controls network connections between trusted and untrusted networks.
  • Requirement 11.4.5 mandates segmentation penetration testing for service providers -- validating that segmentation controls actually work, not just that they exist on paper.

The scope reduction impact is dramatic. A company that properly segments its CDE from the rest of its infrastructure can reduce its PCI scope from hundreds of systems to fewer than a dozen. For a detailed walkthrough of PCI scope reduction strategies, see our PCI DSS Scope Reduction Guide and the Complete PCI DSS Guide.

SOC 2: CC6.1 and CC6.6 -- Logical Access and System Boundaries

SOC 2 addresses segmentation through its Common Criteria for logical and physical access controls:

  • CC6.1 requires the entity to implement logical access security software, infrastructure, and architectures over protected information assets to protect them from unauthorized access. Network segmentation is a core component of this logical access infrastructure.
  • CC6.6 requires the entity to restrict the ability of an entity's authorized user to access resources to only those resources required for their assigned job function. At the network layer, this means systems should only have connectivity to other systems that are operationally necessary.
  • CC6.7 requires the entity to restrict the transmission, movement, and removal of information to authorized internal and external users and processes, and to protect it during transmission. Segmentation enforces this by controlling which systems can transmit data to which other systems.

SOC 2 auditors will evaluate whether your network architecture enforces the boundaries described in your system description. If your system description says "the production environment is isolated from corporate networks," the auditor will verify that isolation exists -- through network diagrams, firewall rules, security group configurations, and potentially penetration test results.

HIPAA: Section 164.312(e) -- Transmission Security

HIPAA's Security Rule requires covered entities and business associates to implement technical safeguards to protect ePHI:

  • Section 164.312(e)(1) requires implementation of technical security measures to guard against unauthorized access to ePHI that is being transmitted over an electronic communications network.
  • Section 164.312(a)(1) requires implementation of technical policies and procedures for electronic information systems that maintain ePHI to allow access only to those persons or software programs that have been granted access rights.

While HIPAA does not use the term "network segmentation," the requirement to prevent unauthorized access to ePHI during transmission and to restrict access to authorized entities effectively mandates segmentation. Systems that do not need access to ePHI should not have network-level connectivity to systems that store or process it. OCR (the Office for Civil Rights) has cited inadequate network segmentation as a contributing factor in multiple HIPAA enforcement actions.

ISO 27001: A.8.22 -- Segregation of Networks

ISO 27001:2022 is the most direct. Annex A control A.8.22 -- Segregation of Networks -- states:

Groups of information services, users, and information systems shall be segregated in the organization's networks.

The implementation guidance expands on this: the organization should consider managing the security of large networks by dividing them into separate network domains and segregating them from the public network. The segregation can use either physically separate networks or logical segregation (e.g., virtual networking). The perimeter of each domain should be well-defined, and access between network domains should be controlled at the perimeter.

ISO 27001 certification auditors will verify that A.8.22 is implemented, that the implementation is consistent with the risk assessment, and that evidence of ongoing management review exists.

NIST: AC-4 -- Information Flow Enforcement

NIST SP 800-53 control AC-4 requires organizations to enforce approved authorizations for controlling the flow of information within the system and between connected systems based on information flow control policies. Network segmentation is the primary mechanism for implementing AC-4 at the network layer. The control applies across NIST-derived frameworks including FedRAMP, CMMC, and FISMA. For organizations pursuing NIST compliance, our NIST 800-53 Controls Guide provides a detailed walkthrough.


Network Segmentation Approaches: Traditional to Modern

Network segmentation technology has evolved substantially over the past two decades. Understanding each approach -- its strengths, limitations, and compliance applicability -- is essential for designing a segmentation strategy that fits your environment.

VLANs (Virtual Local Area Networks)

VLANs are the oldest and most widely deployed segmentation mechanism. A VLAN creates a logical broadcast domain on a network switch, grouping ports or devices into isolated segments regardless of their physical location.

How it works: Network switches are configured to assign ports to specific VLANs. Devices on VLAN 10 (e.g., the production database tier) cannot communicate with devices on VLAN 20 (e.g., the corporate workstation network) without traffic passing through a Layer 3 device (router or Layer 3 switch) that enforces access control lists (ACLs).

Strengths:

  • Mature technology supported by all enterprise networking equipment
  • Relatively simple to configure and manage
  • Low cost -- uses existing switch infrastructure
  • Sufficient for many compliance segmentation requirements

Limitations:

  • VLANs provide segmentation at the network layer but offer no visibility or control within a VLAN. If two servers in the same VLAN are compromised, VLANs provide no protection.
  • VLAN management becomes complex at scale. Large environments can have hundreds of VLANs, each requiring ACL maintenance.
  • VLAN hopping attacks, while rare in modern environments with proper configuration, remain a theoretical concern that auditors may raise.
  • VLANs do not translate directly to cloud environments.

Compliance applicability: VLANs satisfy PCI DSS segmentation requirements when combined with properly configured firewall rules at VLAN boundaries. They are adequate for SOC 2, HIPAA, and ISO 27001 segmentation requirements in on-premises environments.

Firewall-Based Segmentation

Next-generation firewalls (NGFWs) provide segmentation by sitting at the boundary between network zones and enforcing granular access policies based on IP addresses, ports, protocols, application identity, and user identity.

How it works: Traffic between network zones passes through a firewall appliance (physical or virtual) that inspects each packet against a rule set. Rules can permit or deny traffic based on source, destination, port, protocol, application signature, and other attributes.

Strengths:

  • Deep packet inspection provides application-layer visibility
  • Centralized policy management across multiple zones
  • Logging and alerting capabilities provide audit evidence
  • Integration with identity providers enables user-aware policies

Limitations:

  • Firewall throughput can become a bottleneck for high-traffic inter-zone communication
  • Physical firewall appliances require capacity planning and hardware refresh cycles
  • East-west traffic (server-to-server within data centers) often bypasses perimeter firewalls
  • Rule management complexity grows exponentially with the number of zones

Software-Defined Networking (SDN)

SDN decouples the network control plane from the data plane, centralizing network policy management in a software controller that programs the underlying switches and routers.

How it works: An SDN controller (e.g., VMware NSX, Cisco ACI, or open-source solutions like OpenDaylight) manages network policy centrally. Segmentation policies are defined in the controller and pushed to switches, creating dynamic, programmable network segments that can be created, modified, and deleted without reconfiguring individual devices.

Strengths:

  • Centralized policy management reduces operational complexity
  • Dynamic segmentation adapts to workload changes
  • Visibility across the entire network fabric from a single console
  • API-driven automation integrates with DevOps workflows

Limitations:

  • Significant upfront investment in SDN infrastructure
  • Requires specialized skills to deploy and manage
  • Vendor lock-in risk with proprietary SDN platforms

Micro-Segmentation

Micro-segmentation extends network segmentation to the individual workload level -- each virtual machine, container, or application instance has its own security perimeter with granular policies governing what it can communicate with.

Zero Trust Network Segmentation

Zero trust takes segmentation to its logical conclusion: no network location is trusted, every access request is verified, and policies are based on identity and context rather than network topology. Zero trust network access (ZTNA) replaces VPN-based connectivity with per-application, per-session access that is continuously evaluated.

The next section explores micro-segmentation in depth, as it represents the direction that compliance frameworks are increasingly pushing organizations toward.


Micro-Segmentation: The Future of Network Security for Compliance

Traditional network segmentation divides the network into zones -- typically a DMZ, application tier, database tier, and management network. Traffic between zones is controlled, but traffic within a zone is usually unrestricted. Micro-segmentation eliminates that gap.

What micro-segmentation does differently

Micro-segmentation applies security policies at the workload level. Instead of controlling traffic between network zones, it controls traffic between individual virtual machines, containers, or application processes. Every workload has its own security policy defining exactly which other workloads it can communicate with, on which ports, using which protocols.

Consider a traditional three-tier web application:

  • Traditional segmentation: Web servers are in one VLAN, application servers in another, database servers in a third. Firewall rules permit traffic between tiers on specific ports. But within the web server VLAN, all web servers can communicate with each other freely. If one web server is compromised, the attacker has unrestricted access to every other web server in that zone.
  • Micro-segmentation: Each web server has a policy that permits inbound HTTPS from the load balancer, outbound connections to specific application servers on specific ports, and nothing else. Communication between web servers is denied by default. A compromised web server cannot reach other web servers, cannot reach database servers directly, and cannot initiate connections to the internet. The blast radius of a compromise is reduced to a single server.

Micro-segmentation technologies

Several approaches enable micro-segmentation:

Host-based firewalls (iptables, Windows Firewall) managed at scale. The simplest form of micro-segmentation uses the operating system's built-in firewall, managed centrally through configuration management tools (Ansible, Puppet, Chef) or dedicated microsegmentation platforms. Policies are applied at the host level, independent of the network infrastructure.

Agent-based microsegmentation platforms. Products like Illumio, Guardicore (now Akamai), and Zscaler deploy lightweight agents on each workload that enforce microsegmentation policies, provide real-time visibility into traffic flows, and generate audit-ready reports. These platforms typically include a discovery phase where they map all communication patterns before suggesting or enforcing policies.

Hypervisor-based segmentation. VMware NSX and similar platforms implement microsegmentation at the hypervisor layer, below the guest operating system. Policies are enforced at the virtual switch level, which means they apply even if the guest OS is compromised and its host firewall disabled.

Container and Kubernetes network policies. In containerized environments, Kubernetes Network Policies, Calico, Cilium, and Istio service mesh provide microsegmentation at the pod and service level. This is covered in the cloud-native section below.

Why auditors increasingly expect micro-segmentation

While no compliance framework explicitly requires micro-segmentation by name, the direction of travel is clear. PCI DSS v4.0 introduced requirement 6.4.3 (managing payment page scripts), reflecting the standard's increasing granularity. SOC 2 auditors evaluating CC6.1 are asking more probing questions about east-west traffic controls, not just perimeter defenses. The 2024 update to the NIST Cybersecurity Framework emphasizes continuous verification and assume-breach principles that align directly with micro-segmentation.

For organizations preparing for future audit cycles, investing in micro-segmentation now positions you ahead of tightening expectations.


Network Segmentation for PCI DSS: Reducing Your Compliance Scope

PCI DSS scope reduction through network segmentation is the single highest-ROI compliance activity for organizations that process, store, or transmit cardholder data. Done correctly, it can reduce the number of in-scope systems by 80% or more, dramatically cutting audit cost, engineering effort, and ongoing maintenance burden.

How PCI DSS scope is determined

The PCI Security Standards Council defines scope as: all system components that are included in or connected to the cardholder data environment (CDE). The CDE includes all systems that store, process, or transmit cardholder data or sensitive authentication data, plus all systems that provide security services to the CDE or that could impact the security of the CDE.

That last phrase -- "could impact the security of the CDE" -- is where scope expands explosively in unsegmented environments. On a flat network, a developer workstation that can ping a production database server is potentially in scope. A monitoring server that collects logs from CDE systems is in scope. A jump box used to administer CDE servers is in scope. Without segmentation, the scope boundary extends to the entire network.

How segmentation reduces scope

Proper segmentation creates a clear boundary around the CDE. Systems outside that boundary cannot communicate with CDE systems and therefore cannot impact their security. These systems are out of scope for PCI DSS.

Before segmentation (flat network):

  • 400 servers, 200 workstations, 50 network devices -- all potentially in scope
  • Full PCI DSS assessment (300+ requirements applied to 650 systems)
  • Assessment cost: $150,000-$400,000+
  • Remediation and maintenance: 6-12 months of engineering time annually

After segmentation:

  • CDE isolated to 15 servers, 2 workstations, 5 network devices
  • Full PCI DSS requirements apply only to the 22 in-scope systems
  • Out-of-scope systems have no PCI DSS requirements (other than maintaining the segmentation itself)
  • Assessment cost: $40,000-$80,000
  • Remediation and maintenance: 2-3 months of engineering time annually

For a detailed walkthrough of PCI scope reduction, including tokenization and hosted payment pages, see our PCI DSS Scope Reduction Guide.

PCI DSS segmentation validation requirements

PCI DSS does not simply accept segmentation on faith. Requirement 11.4.5 (for service providers) and 11.4.6 (for all entities) require that segmentation controls are validated through penetration testing:

  • Segmentation penetration tests must verify that segmentation methods are operational and effective, and that all out-of-scope systems are isolated from the CDE.
  • Testing must occur at least annually and after any changes to segmentation controls or methods.
  • Service providers must test segmentation every six months.
  • Tests must include attempts to traverse segmentation controls from every out-of-scope segment to the CDE, and from the CDE to every out-of-scope segment.

A common audit failure: the organization has firewall rules that appear to segment the CDE, but the penetration test reveals a misconfigured VLAN, a forgotten management interface, or a legacy server with dual-homed network interfaces that bridge segments. The segmentation exists on paper but fails in practice.


Network Segmentation for Cloud-Native and SaaS Companies

For companies built on AWS, GCP, or Azure -- and especially those running containerized workloads on Kubernetes -- network segmentation uses fundamentally different tools than traditional on-premises environments. The principles are identical (isolate, control, monitor), but the implementation is cloud-native.

VPCs and Subnets

Virtual Private Clouds (VPCs) are the cloud equivalent of physical network segments. Each VPC is an isolated network environment with its own IP address space, routing tables, and network gateways.

Best practices for VPC segmentation:

  • Separate VPCs for separate trust levels. Production, staging, development, and management environments should each have their own VPC. Cross-VPC communication should be explicitly configured through VPC peering or transit gateways with strict route controls.
  • Public and private subnets within each VPC. Systems that receive internet traffic (load balancers, API gateways) live in public subnets. Application servers, databases, and internal services live in private subnets with no direct internet access.
  • Separate VPCs for the CDE. In PCI DSS environments, the cardholder data environment should have its own VPC with peering connections only to the specific VPCs that require connectivity.

Security Groups and Network ACLs

Security groups are the primary workload-level network segmentation mechanism in cloud environments:

  • Security groups act as stateful firewalls attached to individual instances (VMs, containers, managed services). They define allowed inbound and outbound traffic by port, protocol, and source/destination.
  • Network ACLs act as stateless firewalls at the subnet level, providing an additional layer of segmentation.

Segmentation best practices for security groups:

  • Default deny: start with security groups that deny all traffic, then add specific allow rules.
  • Reference security groups by ID, not by IP range. This ensures rules adapt dynamically as instances scale.
  • One security group per function: web servers, application servers, database servers, and management instances should each have their own security group.
  • Never use 0.0.0.0/0 (allow all) in security group rules except for public-facing load balancers on port 443.

Kubernetes Network Policies

In Kubernetes environments, network policies provide pod-level micro-segmentation:

apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: database-allow-only-api
  namespace: production
spec:
  podSelector:
    matchLabels:
      tier: database
  policyTypes:
  - Ingress
  ingress:
  - from:
    - podSelector:
        matchLabels:
          tier: api
    ports:
    - protocol: TCP
      port: 5432

This policy states: pods labeled tier: database in the production namespace accept inbound traffic only from pods labeled tier: api, only on port 5432 (PostgreSQL). All other inbound traffic is denied.

Critical note: Kubernetes network policies require a CNI (Container Network Interface) plugin that supports them. The default kubenet CNI does not enforce network policies -- you need Calico, Cilium, Weave Net, or a cloud provider's CNI with network policy support enabled.

Service Mesh Segmentation

For organizations running microservices, a service mesh (Istio, Linkerd, Consul Connect) provides application-layer segmentation through mutual TLS (mTLS) and authorization policies:

  • mTLS between services ensures that communication between microservices is encrypted and that each service's identity is verified cryptographically. A compromised service cannot impersonate another service.
  • Authorization policies define which services can communicate with which other services, independent of network topology. This is segmentation at the application identity layer, not the network layer.
  • Traffic observability provides detailed logs of all inter-service communication -- useful audit evidence for demonstrating that segmentation is in place and functioning.

Service mesh segmentation is particularly valuable for compliance because it provides identity-based segmentation that persists regardless of the underlying network topology -- a strong implementation of zero trust principles.


Designing a Segmentation Strategy: Step by Step

Building effective network segmentation is not a weekend project. It requires a systematic approach that accounts for existing traffic patterns, business requirements, compliance mandates, and operational realities. Rushing segmentation without understanding traffic flows leads to outages. Neglecting it leads to audit failures.

Step 1: Map Data Flows

Before defining any segments, you must understand how data currently flows through your environment. This means identifying:

  • Where sensitive data lives. Which databases, file shares, object storage buckets, and applications store cardholder data, ePHI, PII, or other regulated data?
  • What systems process sensitive data. Which application servers, batch processing systems, and ETL pipelines interact with sensitive data?
  • What systems transmit sensitive data. Which APIs, messaging queues, and file transfer mechanisms move sensitive data between systems?
  • What systems support the above. Which DNS servers, authentication systems, logging platforms, and monitoring tools do the sensitive-data systems depend on?

Use network flow analysis tools (NetFlow, VPC Flow Logs, cloud-native traffic mirroring) to capture actual traffic patterns. Do not rely on architecture diagrams alone -- they are almost always out of date. Real traffic analysis reveals communication patterns that no one documented.

Step 2: Define Security Zones

Based on data flow analysis, define security zones. A zone is a group of systems that share the same trust level and data sensitivity classification. Common zones include:

  • Cardholder Data Environment (CDE): Systems that store, process, or transmit cardholder data (PCI DSS)
  • ePHI Zone: Systems that store or process electronic protected health information (HIPAA)
  • Production Application Zone: Application servers that serve customer-facing functionality
  • Production Data Zone: Databases and data stores for production applications
  • Internal/Corporate Zone: Employee workstations, internal tools, corporate applications
  • Development/Staging Zone: Non-production environments for development and testing
  • Management Zone: Infrastructure management systems (monitoring, logging, CI/CD, configuration management)
  • DMZ: Externally facing systems (load balancers, reverse proxies, API gateways)
  • Third-Party Integration Zone: Systems dedicated to third-party connections and data exchange

Step 3: Define Inter-Zone Rules

For each pair of zones, define whether communication is permitted and, if so, what specific traffic flows are allowed:

Source ZoneDestination ZoneAllowed TrafficJustification
DMZApplication ZoneHTTPS (443)Load balancer to app servers
Application ZoneData ZonePostgreSQL (5432), Redis (6379)App servers to databases
Management ZoneAll ZonesSSH (22), HTTPS (443)Administrative access
CDEPayment ProcessorHTTPS (443)Payment API calls
Corporate ZoneCDEDeniedScope isolation
Development ZoneProduction ZonesDeniedEnvironment isolation

The default rule for any zone pair not explicitly listed should be deny-all. This is the fundamental principle: deny by default, permit by exception.

Step 4: Implement Enforcement Points

Deploy the technical controls that enforce your segmentation rules:

  • Configure firewalls, security groups, VPC routing, and network ACLs to match your inter-zone rule matrix.
  • Implement host-based firewalls as a defense-in-depth measure (belt and suspenders with network-level segmentation).
  • Deploy Kubernetes network policies if running containerized workloads.
  • Configure service mesh authorization policies if using microservices.

Step 5: Implement Monitoring and Alerting

Segmentation without monitoring is segmentation you cannot prove to an auditor and cannot detect violations of:

  • Log all traffic at enforcement points (firewall logs, VPC flow logs, security group flow logs).
  • Alert on denied traffic that indicates potential segmentation violations or attack attempts.
  • Alert on any changes to segmentation rules (firewall rule modifications, security group changes, network policy updates).
  • Feed all segmentation-related logs into your SIEM for correlation and long-term retention.

Step 6: Validate and Iterate

Test your segmentation before declaring it production-ready. Penetration testing (covered in a dedicated section below) validates that segmentation works as designed. Automated scanning validates it on an ongoing basis.


Network Segmentation Architecture Patterns

The following architecture patterns represent proven approaches to network segmentation. Most production environments implement a combination of these patterns.

The DMZ Pattern

The DMZ (demilitarized zone) is the oldest and most fundamental segmentation pattern. It places externally-facing systems (web servers, API gateways, load balancers) in a zone between the public internet and the internal network. The DMZ has two boundaries: one facing the internet and one facing the internal network. Traffic from the internet can reach the DMZ, and traffic from the DMZ can reach specific internal systems, but traffic from the internet cannot reach internal systems directly.

Architecture:

Internet --> [Firewall] --> DMZ (load balancers, WAF, reverse proxy)
                              |
                           [Firewall]
                              |
                        Internal Network

The Three-Tier Pattern

The three-tier pattern extends the DMZ concept to separate the web/presentation tier, application/logic tier, and data tier into distinct segments:

Architecture:

Internet --> [FW] --> Web Tier (load balancers, CDN edges)
                        |
                     [FW/SG]
                        |
                   App Tier (API servers, business logic)
                        |
                     [FW/SG]
                        |
                   Data Tier (databases, object storage, caches)

Each tier only communicates with adjacent tiers. The web tier cannot reach the data tier directly -- all requests pass through the application tier. This limits the impact of a web server compromise: the attacker must also compromise the application tier before reaching the database.

The Isolated CDE Pattern (PCI DSS)

For PCI DSS compliance, the CDE is isolated in its own network segment with strictly controlled access:

Architecture:

Corporate Network <--[FW: Deny All]--> CDE Network
                                           |
Production App Network <--[FW: 443 only]--> CDE Network
                                           |
                                    [FW: 443 only]
                                           |
                                    Payment Processor

The corporate network has no connectivity to the CDE. The production application network can reach specific CDE systems on specific ports only. The CDE can reach the payment processor's API. All other traffic is denied.

The Management Network Pattern

Management systems (monitoring, logging, CI/CD, configuration management, bastion hosts) present a segmentation challenge: they need access to many zones to perform their function, but that broad access makes them high-value targets.

The solution is a dedicated management zone with:

  • Strictly controlled inbound access (e.g., VPN or bastion host only, with MFA)
  • Outbound access to managed zones limited to specific management ports
  • Enhanced monitoring and logging on all management zone traffic
  • Separate credentials for management access (not the same credentials used for application access)

Testing and Validating Segmentation

Segmentation that has not been tested is segmentation that might not work. Auditors know this, which is why every compliance framework either requires or strongly expects validation of segmentation controls.

Penetration Testing for Segmentation Validation

PCI DSS is the most prescriptive about segmentation testing, but the approach applies universally:

What to test:

  • From each out-of-scope zone, attempt to reach every system in the CDE (or other protected zone) on every port. Every connection attempt should fail.
  • From the CDE, attempt to reach systems in out-of-scope zones that should not be accessible. Egress controls matter too.
  • Attempt VLAN hopping, ARP spoofing, and other Layer 2 attacks that could bypass network segmentation.
  • Test for misconfigured dual-homed systems (systems with network interfaces in multiple zones) that could bridge segments.
  • Test for DNS-based data exfiltration paths that segmentation rules might not block.

How often to test:

  • PCI DSS: Annually for merchants, semi-annually for service providers, and after any significant change to segmentation controls.
  • SOC 2, ISO 27001, HIPAA: At least annually, with additional testing after significant infrastructure changes.

Automated Segmentation Scanning

Manual penetration testing provides deep validation but is point-in-time. Automated scanning provides continuous validation:

  • Port scanning from each zone: Automated scheduled scans from each network zone, targeting systems in protected zones, verify that segmentation rules remain intact.
  • Configuration compliance scanning: Tools that compare actual firewall rules, security group configurations, and network ACLs against a defined baseline detect rule drift.
  • Cloud security posture management (CSPM): Platforms that continuously evaluate cloud infrastructure configurations against security policies can flag security group changes that violate segmentation requirements.

Continuous Validation

The gold standard for segmentation validation is continuous monitoring that detects violations in real time:

  • VPC flow log analysis that alerts when traffic between isolated zones is observed.
  • Firewall log analysis that alerts on new allow rules between zones that should be isolated.
  • Infrastructure-as-code drift detection that flags when deployed configurations diverge from the approved state.

Network Segmentation Documentation for Audit Evidence

Segmentation that works but is not documented is segmentation that auditors cannot verify. Every compliance framework requires evidence that segmentation is intentionally designed, properly implemented, and regularly validated. The documentation burden is not trivial, but it is essential.

Network Diagrams

Every auditor will ask for network diagrams. These must be:

  • Current. Diagrams that reflect the environment as it exists today, not as it existed when the diagrams were last updated two years ago. Maintain diagrams in a version-controlled system and update them as part of the change management process.
  • Accurate. Diagrams must show all network zones, enforcement points between zones, permitted traffic flows between zones, and the location of systems that store or process sensitive data.
  • Layered. Provide both high-level architecture diagrams (showing zones and their relationships) and detailed diagrams (showing individual systems, IP addresses, and port-level rules within each zone).

For PCI DSS specifically, the following diagrams are required:

  • A diagram showing all cardholder data flows (Requirement 1.2.3)
  • A network diagram showing the CDE and all connections to other networks (Requirement 1.2.3)
  • A diagram showing segmentation controls between the CDE and out-of-scope networks

Firewall Rule Documentation

Document all firewall rules with:

  • Source and destination (zone, IP range, or security group)
  • Ports and protocols permitted
  • Business justification for each rule (why this traffic flow is necessary)
  • Rule owner (who approved the rule and who is responsible for reviewing it)
  • Review date (when the rule was last reviewed and confirmed as still necessary)

PCI DSS Requirement 1.2.5 requires that all services, protocols, and ports allowed are identified, approved, and have a defined business need. ISO 27001 expects similar documentation under A.8.22.

Segmentation Test Reports

Maintain records of all segmentation validation activities:

  • Penetration test reports showing segmentation validation results
  • Automated scan results showing ongoing segmentation integrity
  • Records of segmentation control changes and the testing performed after each change
  • Remediation records for any segmentation deficiencies identified during testing

Change Management Records

Segmentation is not static. Systems are added, removed, and reconfigured. Network rules change. Document every change to segmentation controls through your change management process, including:

  • What changed
  • Why it changed
  • Who approved the change
  • What testing was performed after the change to verify segmentation integrity
  • Evidence that the change did not introduce segmentation gaps

For guidance on establishing a compliant change management process, see our Change Management Process Guide.


Common Segmentation Mistakes That Fail Audits

After working with hundreds of companies preparing for SOC 2, PCI DSS, ISO 27001, and HIPAA audits, we see the same segmentation failures repeatedly. These are not theoretical risks -- they are the specific issues that auditors find, that penetration testers exploit, and that lead to audit findings.

Mistake 1: Segmentation on Paper Only

The firewall rules exist. The network diagram shows zones. But the actual traffic patterns do not match. A VPC peering connection was added for a migration project and never removed. A security group was temporarily opened for debugging and never tightened. A VLAN was reconfigured but the firewall rules were not updated.

How to avoid it: Validate segmentation through testing, not just documentation review. Automated scanning catches drift that documentation misses.

Mistake 2: Overly Permissive Rules

The rule permits traffic from the application zone to the database zone -- but it permits all ports, not just the database port. Or it permits traffic from the entire corporate network to the CDE, rather than from specific jump boxes. Overly permissive rules technically provide some segmentation, but auditors and penetration testers will flag them as insufficient.

How to avoid it: Apply the principle of least privilege to every firewall rule. Permit only the specific ports, protocols, and sources that are operationally necessary.

Mistake 3: Forgotten Management Interfaces

Servers often have management interfaces (IPMI, iLO, iDRAC, KVM-over-IP) that provide out-of-band access to the system. These interfaces frequently have their own network connections that bypass normal segmentation. If a CDE server's management interface is on the corporate network, the segmentation is compromised.

How to avoid it: Inventory all management interfaces and ensure they are on the management network with the same level of segmentation control as the primary network interfaces.

Mistake 4: Dual-Homed Systems

A system with network interfaces in two different zones bridges those zones. If a jump box has one interface in the corporate network and another in the CDE, an attacker who compromises the jump box has bypassed the segmentation entirely.

How to avoid it: Minimize dual-homed systems. Where they are necessary (e.g., bastion hosts), treat them as the highest-priority systems for hardening, monitoring, and access control.

Mistake 5: No Egress Controls

Many organizations focus exclusively on ingress controls (what can reach the protected zone) and neglect egress controls (what the protected zone can reach). If CDE systems can initiate connections to the internet, an attacker who compromises a CDE system can exfiltrate data.

How to avoid it: Implement egress controls that restrict outbound traffic from protected zones to only the specific destinations and ports that are operationally necessary (e.g., payment processor APIs, patch management servers).

Mistake 6: DNS and NTP Bypass

DNS and NTP traffic are frequently exempted from segmentation rules because they are considered "infrastructure" services. But DNS is a well-known data exfiltration channel, and NTP can be used for amplification attacks. Shared DNS servers that serve both CDE and out-of-scope systems create a network connection between those zones.

How to avoid it: Either deploy dedicated DNS and NTP servers for each zone, or carefully evaluate whether shared infrastructure services create cross-zone connectivity that impacts scope.

Mistake 7: Stale Documentation

The segmentation was properly implemented 18 months ago. Since then, 47 changes have been made to firewall rules, 12 new servers have been added, and the network diagram has not been updated. The auditor reviews the documentation, compares it to the live environment, and finds discrepancies everywhere.

How to avoid it: Integrate segmentation documentation updates into your change management process. Every change to segmentation controls triggers a documentation update. For a systematic approach to this, see our Change Management Process Guide.


Frequently Asked Questions

What is network segmentation in simple terms?

Network segmentation is dividing a network into smaller, isolated sections -- like separate rooms in a building -- where each section has its own locked door controlling who can enter. Systems in one section cannot access systems in another section without explicitly passing through a controlled checkpoint. This limits the damage an attacker can do if they compromise one system, reduces the scope of compliance audits, and enforces the principle that systems should only have access to what they need.

What is the difference between network segmentation and micro-segmentation?

Traditional network segmentation divides the network into zones (e.g., DMZ, application tier, database tier) and controls traffic between those zones. Micro-segmentation extends this concept to the individual workload level -- each server, virtual machine, or container has its own security perimeter. Network segmentation controls east-west traffic between zones; micro-segmentation controls east-west traffic within zones. Micro-segmentation provides finer-grained control and smaller blast radius, but is more complex to implement and manage.

Does PCI DSS require network segmentation?

PCI DSS does not technically require network segmentation -- it is possible to achieve compliance without it. However, without segmentation, every system on your network that could connect to the cardholder data environment is in scope for the full PCI DSS assessment. For any non-trivial organization, this makes compliance prohibitively expensive and operationally burdensome. In practice, segmentation is a de facto requirement. PCI DSS v4.0 Requirements 1.2 through 1.4 govern how segmentation must be implemented when it is used, and Requirement 11.4.5 mandates penetration testing of segmentation controls.

How does network segmentation help with HIPAA compliance?

HIPAA's Security Rule requires technical safeguards to protect ePHI, including access controls (Section 164.312(a)) and transmission security (Section 164.312(e)). Network segmentation implements these requirements by ensuring that only systems and users that need access to ePHI have network-level connectivity to systems that store or process it. Segmentation also limits the scope of a HIPAA risk assessment -- systems that are provably isolated from ePHI environments carry lower risk and require less intensive controls.

What is the difference between network segmentation and a firewall?

A firewall is one of several tools used to implement network segmentation, but they are not the same thing. Network segmentation is the strategy of dividing a network into isolated zones. A firewall is a specific technology that enforces access rules at the boundary between zones. Other technologies that implement segmentation include VLANs, security groups (in cloud environments), network ACLs, Kubernetes network policies, and service mesh authorization policies. Effective segmentation typically uses multiple technologies in combination.

How do I implement network segmentation in AWS?

In AWS, network segmentation is implemented through a combination of VPCs (separate networks for separate trust levels), subnets (public and private within each VPC), security groups (workload-level ingress and egress rules), network ACLs (subnet-level stateless firewall rules), VPC peering or Transit Gateway (controlled inter-VPC connectivity), and VPC flow logs (monitoring and audit evidence). For Kubernetes workloads on EKS, add Kubernetes network policies using a CNI like Calico or the VPC CNI with network policy support.

How often should network segmentation be tested?

PCI DSS requires segmentation testing at least annually for merchants and semi-annually for service providers, plus after any significant change to segmentation controls. SOC 2 and ISO 27001 do not specify a testing frequency but expect regular validation -- annually at minimum. Best practice is continuous or near-continuous validation through automated scanning, supplemented by annual manual penetration testing that specifically targets segmentation controls.

Can network segmentation replace a firewall?

No. Network segmentation is a strategy; firewalls are one of the tools that implement that strategy. Segmentation without firewalls (or equivalent enforcement points) is just a network diagram with no teeth. Even in cloud environments where traditional firewall appliances are less common, security groups, network ACLs, and network policies serve the same enforcement function. Effective segmentation requires both the logical design (what zones exist and how they relate) and the technical enforcement (firewalls, security groups, or equivalent controls that prevent unauthorized cross-zone traffic).


Build Segmentation That Passes Audits -- and Actually Protects Your Environment

Network segmentation is one of the highest-leverage security controls an organization can implement. It reduces compliance scope, limits breach impact, enforces least privilege at the network layer, and provides the architectural foundation for zero trust. But the gap between segmentation that exists on paper and segmentation that actually works in production is where audit findings live -- and where breaches spread.

QuickTrust helps companies design, implement, document, and continuously validate network segmentation that satisfies SOC 2, PCI DSS, HIPAA, and ISO 27001 auditors. Our platform automates the evidence collection that makes segmentation auditable: network diagrams stay current, firewall rule documentation stays accurate, segmentation test results are tracked and reported, and drift from approved configurations is detected and flagged before auditors find it.

Whether you are building segmentation from scratch, remediating audit findings, or preparing for your first compliance certification, schedule a demo to see how QuickTrust turns network segmentation from an audit liability into a competitive advantage.

Ready to get audit-ready?

Our engineers implement controls, prepare evidence, and coordinate your audit.

Get a Free Assessment

Related Articles