A zone is a logically isolated network segment that groups assets with similar security requirements, enabling tailored policies and controlled traffic flow to limit breach impact.

In cybersecurity, a zone is a logically isolated segment within a network infrastructure designed to group assets that share similar security requirements, trust levels, or functional purposes. By dividing a network into distinct zones, organizations can apply tailored security policies and access rules to each segment, enabling granular control over traffic flow and restricting communication between different trust domains. Zone boundaries are typically enforced by security devices such as firewalls, routers, or access control lists, which filter and monitor all data crossing zone borders.

This segmentation strategy is a cornerstone of defense-in-depth architectures, significantly limiting the lateral spread of security breaches and reducing the overall attack surface. Common examples include demilitarized zones (DMZs) for public-facing services, internal user zones, and highly restricted zones for sensitive data and critical servers. By systematically isolating assets and controlling inter-zone communication, zones bolster the resilience, integrity, and confidentiality of the entire network environment.