To secure the enclave, the site must implement defense-in-depth security. This requires the deployment of various network security elements at strategic locations. The enclave must also be segregated into separate subnets with unique security policies. Subnetting provides a number of essential network services (e.g., public content, remote access, and perimeter protection). If isolation techniques, such as subnetting, are not used, unauthorized access to privileged information could result.
Physical separation of subnets is not the function of the firewall. |