Repository / Network and Security
Network and Security
Firewall architecture, segmentation, VPN, and zero trust network patterns.
Patternpublished2026-02-08
A balanced architecture combining identity, next-gen firewall inspection, and EDR/XDR for east-west data center traffic.
zero-trustdata-centernetwork-segmentationfirewalledr-xdr
Guidepublished2026-02-08
Practitioner-focused strategies for implementing NIST 800-171 controls in enterprise environments, from architecture through CMMC preparation.
nist-800-171compliancecmmcfederalsecurity-controls
Patternpublished2026-02-08
Everyone talks about implementing zero trust. Almost nobody describes what the architecture looks like after you've actually achieved it. Here's what changes, what stays, and what most people get wrong.
zero-trustidentityarchitecturesegmentationenterprise-architecture
Patternpublished2026-02-08
What a properly segmented enterprise network looks like before zero trust -- firewall-enforced zones, VPN remote access, and where this model reaches its limits.
zero-trustvpnsegmentationfirewallenterprise-architecture