Zero Trust micro-segmentation
DFW packet flow
distributed logical router
existing infrastructure
monitor logs
overlay protocol and VXLAN
communication
headers
overlay packet flow
scalable infrastructure
traditional model
VMware deployment
application dependency mapping
perimeter firewall policies
ports and services
prerequisites
VMware NSX Distributed Firewall
whitelisting/positive security model
Zero Trust network
access model view
application architecture
current architecture
event-driven architecture
grouping application
infrastructure
layered architecture
microservices architecture
monitoring team
security consultant
stakeholder
Without Zero Trust
DFW identifies
firewall policy
infrastructure
TSC
SeeT-shirt company (TSC