In this post I want to go back to the basics of security design and the implementation of the security buzz words that I am quite certain that everyone has heard, such as Defense in Dept, Zero Trust, Micro Segmentation etc. With that I would like to provide an overview of a fictitious network that…