Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2 GreensProduct 37 Red4 GreenProduct 45 Red5 GreenProduct 54 Red4.5 Green
8/2/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?course_id=_109247_1&includeDeleted=true&attem… 1/2
SafeAssign Originality Report
Summer 2019 - Cloud Computing (ITS-532-06) - Second Bi-Term • Week 5 - Assignment • Submitted on Fri, Aug 02, 2019, 8:55 AM
Sai Kumar Baruri View Report Summary
View Originality Report - Old Design
INCLUDED SOURCES
Sources
Institutional database (8) %92
Student paper
Student paper
Student paper
Student paper
Student paper
Student paper
Student paper
Student paper
Top sources
Attachment 1
Week_5_Assignment_Microseg…
%92
4
8
1
5
7
6
2
3
Running head: MICROSEGMENTATION AND ZERO TRUST SECURITY 1
MICROSEGMENTATION AND ZERO TRUST SECURITY 2
Microsegmentation and Zero Trust Security
Week 5 - Assignment
by Sai Kumar Baruri
Professor D. Barrett
University of Cumberland’s
ITS 532 - 06
08/02/2019
Microsegmentation and Zero Trust Security
Introduction
The 21st century is much characterized by increased technology, access to the internet and the adoption of
information systems. Due to the adoption of technologies, there is an increase in the realization of the
benefits that come with IT value. However, technological advancements have negatively affected society
and brought about security threats. This has resulted in the implementation of security mechanisms
that enhance the security of IT assets. Such mechanisms include physical network segmentation, micro-
segmentation and zero-trust security. Physical network segmentation
The physical network segmentation in the cloud includes the segmentation of IT components that are
based on the logic outlines the endpoints to be on each network. The physical network segmentation seeks
to group some of the logical components into specific groups according to their functions and in turn,
access, the privileges assigned (Mammela et al., 2016). The physical network segmentation concerning
cloud computing implies the logical division of the network into minor segments that share the same
access permissions and characteristics. For instance, the cloud computing network is physically segmented
as a private cloud computing. Micro-segmentation
The micro-segmentation comprises of security-enhancing technology that is used in breaking down a given
data Centre which is a cloud-based into logical elements. This facilitates s the implementation of high-level
information technology security policies on the logical elements to aid in their control (Baum & Chang,
2014). The micro-segmentation in cloud computing seeks to break down the applications and the
various network segments into workloads. This implies that the communication and access of applications
are restricted according to the IT policies definition to build on security. Moreover.
1. Sheet1Country ACountry BProduct 110 Reds9 GreensProduct
22 Reds2.2 GreensProduct 37 Red4 GreenProduct 45 Red5
GreenProduct 54 Red4.5 Green
8/2/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?course_id=_109247_
1&includeDeleted=true&attem… 1/2
SafeAssign Originality Report
Summer 2019 - Cloud Computing (ITS-532-06) - Second Bi-
Term • Week 5 - Assignment • Submitted on Fri, Aug 02, 2019,
8:55 AM
Sai Kumar Baruri View Report Summary
View Originality Report - Old Design
INCLUDED SOURCES
Sources
Institutional database (8) %92
Student paper
Student paper
Student paper
Student paper
2. Student paper
Student paper
Student paper
Student paper
Top sources
Attachment 1
Week_5_Assignment_Microseg…
%92
4
8
1
5
7
6
2
3
Running head: MICROSEGMENTATION AND ZERO TRUST
SECURITY 1
MICROSEGMENTATION AND ZERO TRUST SECURITY 2
3. Microsegmentation and Zero Trust Security
Week 5 - Assignment
by Sai Kumar Baruri
Professor D. Barrett
University of Cumberland’s
ITS 532 - 06
08/02/2019
Microsegmentation and Zero Trust Security
Introduction
The 21st century is much characterized by increased
technology, access to the internet and the adoption of
information systems. Due to the adoption of technologies, there
is an increase in the realization of the
benefits that come with IT value. However, technological
advancements have negatively affected society
and brought about security threats. This has resulted in the
implementation of security mechanisms
that enhance the security of IT assets. Such mechanisms include
physical network segmentation, micro-
segmentation and zero-trust security. Physical network
segmentation
The physical network segmentation in the cloud includes the
segmentation of IT components that are
4. based on the logic outlines the endpoints to be on each network.
The physical network segmentation seeks
to group some of the logical components into specific groups
according to their functions and in turn,
access, the privileges assigned (Mammela et al., 2016). The
physical network segmentation concerning
cloud computing implies the logical division of the network into
minor segments that share the same
access permissions and characteristics. For instance, the cloud
computing network is physically segmented
as a private cloud computing. Micro-segmentation
The micro-segmentation comprises of security-enhancing
technology that is used in breaking down a given
data Centre which is a cloud-based into logical elements. This
facilitates s the implementation of high-level
information technology security policies on the logical elements
to aid in their control (Baum & Chang,
2014). The micro-segmentation in cloud computing seeks to
break down the applications and the
various network segments into workloads. This implies that the
communication and access of applications
are restricted according to the IT policies definition to build on
security. Moreover, the micro-segmentation
in cloud computing implies narrowing down of control access
and specific workloads which bars
unauthorized access and implements zero-trust policy.
Difference between physical network
segmentation and micro-segmentation
The physical network segmentation is different from micro-
segmentation in that; the physical network
segmentation divides systems according to their defined end-
5. points. Through this, it implies some form of
network access restriction based on the access rights grouped
into several components. On the other hand,
micro-segmentation implies a division of the organization
systems into workloads which are strictly defined
and high-level policies for security enhancement. Therefore, the
physical network segmentation is a more
generalized security policy that is less secure. However, micro-
segmentation narrows down into specific
workloads that restrict access and integration, thus becoming
more secure. Nonetheless, the micro-
segmentation can be implemented on physical network
segmentation to secure workloads. At the same
time, physical network segmentation has high-level security
mechanism hence being less useful. The
concept of zero security
Massive data breaches in databases have characterized the 21
centuries. Due to this, security has become a
crucial aspect to consider because the use of information
systems in the current world is full of threats. Due
to the increased security threats in the information systems, it
has led to the implementation and initiation
of zero-trust security. The zero-trust security implies a security-
enhancing model for both insider and
outsider access is limited to no-automatic access until verified
before granting access right (Kindervag,
2016). This model treats anything that is either within its
parameter or beyond as a suspect with the
potential of compromising security, which means verification
comes first. Zero security models are
1
2
7. 175151e6991d&course_id=_109247_1&includeDeleted=true&fo
rce=true
8/2/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?course_id=_109247_
1&includeDeleted=true&attem… 2/2
different from conventional security model in that; zero trust
security introduces system latency
where verification is done on anything either inside or outside
trying to gain access. Therefore, the
automatic access grating is disabled until the user is verified.
The conventional security model relies on a
security mitigation procedure implemented to promote security
that verifies the identity of the user.
However, this model supports ubiquitous security, particularly
in a cloud environment by enabling a unified
approach to security where identity must be verified regardless
of the privileges assigned before access
grants. Nonetheless, this reduces the overreliance on security
mitigation techniques such as the use of
SIEM tools, which are at times compromised. Micro-
segmentation for zero-trust security The micro-
segmentation comprises of variable security technology which
builds the security of a given organizations’
information systems. The micro-segmentation topology could
potentially be used to implement zero-
trust security in the following ways.
4
8. 4
Through developing tighter IT security policies and
implementing the same on the system workloads
(logical segments) which disables automatic access granting to
anything both within and without the
facilitate parameter until identity proved and user verified. The
non-tolerance to access the unverified users
tends to implement zero-trust security. Anything seeking access
is treated as a success regardless of the
identified privileges assigned to each. Implementing zero trust
model
Modern organizations should consider the implementation of a
zero-trust security approach. This is
because the zero-trust security approach is the most efficient
and it implements access control capabilities
that secure the systems. The approach is based on the principle
of verification before access grants.
However, the approach tends to be more effective in barring
unauthorized access. Additionally, a zero-trust
security approach declines the over-reliant on implemented
security mitigation procedures like the use of
SIEM tools which have been compromised severally. This
approach treats anything as a suspect and thus
causes effective scrutiny before access grants.
References
Baum, G., & Chang, W. (2014). U.S. Patent No. 8,630,902.
Washington, DC: U.S. Patent and Trademark
Office. Kindervag, J. (2016). No more chewy centers: the zero-
trust model of information security.
9. Forrester Research, Inc., dated Mar, 23. Mämmelä, O.,
Hiltunen, J., Suomalainen, J., Ahola, K.,
Mannersalo, P., & Vehkaperä, J. (2016, June). Towards micro-
segmentation in 5G network security. In
European Conference on Networks and Communications
(EuCNC 2016) Workshop on Network
Management, Quality of Service and Security for 5G Networks.
4
4
7
8
8
Word Count: Submitted on: Submission UUID: Attachment
UUID:
1,004 08/02/19 19162e98-9286-b696-108e-09c1d120e1eb
1fa458d7-c991-e0d0-0b74-44db2fdb235c
Top of Form
Name: Graduate Course Rubric
Description: All assignments will be graded according to this
rubric.
Bottom of Form
Novice
Competent
Proficient
Focus
10. Points:
0 (0.00%)
Exhibits a limited understanding of the assignment. Reader is
unable to follow the logic used for the assignment Student’s
writing is weak in the inclusion of supporting facts or
statements.
Points:
10 (10.00%)
Establishes a good comprehension of topic. Student
demonstrates an effective presentation of assignment, with most
support statements helping to support the key focus of
assignment.
Points:
20 (20.00%)
Student exhibits a defined and clear understanding of the
assignment. Student builds upon the assignment with well-
documented and exceptional supporting facts, figures, and/or
statements.
Content/Subject Knowledge
Points:
0 (0.00%)
Student tries to explain some concepts, but overlooks critical
details. Assignment appears vague or incomplete in various
segments. Student does not perceive to have a logical
sequencing of ideas.
Points:
10 (10.00%)
Student exhibits above average usage of subject matter in
assignment. Details and facts presented provide an adequate
presentation of student’s current level of subject matter
knowledge.
Points:
20 (20.00%)
Student demonstrates proficient command of the subject matter
in the assignment.. Student provides comprehensive analysis of
details, facts, and concepts in a logical sequence.
11. Critical Thinking Skills
Points:
0 (0.00%)
Student demonstrates beginning understanding of key concepts,
but overlooks critical details. Learner is unable to apply
information in a problem-solving fashion. Student presents
confusing statements and facts in assignment. No evidence or
little semblance of critical thinking skills.
Points:
10 (10.00%)
Student exhibits a good command of critical thinking skills in
the presentation of material and supporting statements.
Assignment demonstrates the student’s above average use of
relating concepts by using a variety of factors. Overall, student
provides adequate conclusions, with 2 or fewer errors.
Points:
20 (20.00%)
Student demonstrates a higher-level of critical thinking. Learner
provides a strategic approach in presenting examples of problem
solving or critical thinking, while drawing logical conclusions
which are not immediately obvious. Student presents a genuine
intellectual development of ideas throughout assignment.
Organization of Ideas/Format
Points:
0 (0.00%)
Assignment reveals formatting errors and a lack of organization.
. The lack of appropriate references or source materials
demonstrates the student’s need for additional help or training
in this area. Student needs to review and revise the assignment.
Points:
10 (10.00%)
Student explains the majority of points and concepts in the
assignment. Student presents an above average level of
preparedness, with a few formatting errors. Assignment contains
less than 5 resources.
Points:
12. 20 (20.00%)
Student thoroughly understands and excels in explaining all
major points. An original, unique, and/or imaginative approach
to overall ideas, concepts, and findings is presented. Finished
assignment demonstrates student’s ability to plan and organize
research in a logical sequence. Student uses at least of 5-7
references in assignment.
Grammar and Mechanics
Points:
0 (0.00%)
Topics, concepts, and ideas are not coherently discussed or
expressed in assignments. Student’s writing style is weak and
needs improvement, along with numerous proofreading errors.
Assignment lacks clarity, consistency, and correctness. Student
needs to review and revise assignment.
Points:
10 (10.00%)
Student provides an effective display of good writing and
grammar. Assignment appears to be well written with no more
than 3-5 errors. Student provides a final written product that
covers the above-minimal requirements.
Points:
20 (20.00%)
Student demonstrates an excellent command of grammar, as
well as presents research in a clear and concise writing style.
Student excels in the selection and development of a well-
planned research assignment. Assignment is error-free and
reflects student’s ability to prepare a high-quality academic
assignment.
Top of Form
Bottom of Form
13. ITS 532 Module Five Essay Guidelines and Rubric Topic:
Microsegmentation and Zero Trust Security
Overview: Explain the difference between physical network
segmentation and microsegmentation. Explain what it means to
implement zero trust security. Explain how microsegmentation
can support a zero trust network.
Guidelines for Submission: Using APA 6th edition style
standards, submit a Word document that is 3-4 pages in length
(excluding title page, references, and appendices) and include at
least three credible scholarly references to support your
findings. The UC Library is a good place to find these sources.
Be sure to cite and reference your work using the APA guides
and essay template that are located in the courseroom.
Include the following critical elements in your essay:
I. Physical Network Segmentation vs. Microsegmentation:
Briefly describe each networking environment. Describe the
difference between these two networking approaches.
II. Zero Trust Security. Explain the concept of Zero Trust
Security. How is this model different from conventional
security models? How does this model support ubiquitous
security in a cloud environment?
III. Microsegmentation for Zero Trust Security: Explain how
microsegmentation topology provides the foundation for
implementing the Zero Trust model. Why do modern
organizations need to consider implementing a Zero Trust
security approach?
Required elements:
· Please ensure your paper complies APA 6th edition style
guidelines. There is a sample paper provided under the Course
Introduction link.· APA basics:
· Your essay should be typed, double-spaced on standard-sized
paper (8.5" x 11")
· Use 1" margins on all sides, first line of all paragraphs is
indented ½” from the margin
14. · Use 12 pt. Times New Roman font
· Follow the outline provided above and use section headers to
improve the readability of your paper. If I cannot read and
understand it, you will not earn credit for the content.