{"id":16055,"date":"2025-10-08T11:08:56","date_gmt":"2025-10-08T11:08:56","guid":{"rendered":"https:\/\/dmsretail.com\/RetailNews\/defining-a-standard-taxonomy-for-segmentation-cisco-blog\/"},"modified":"2025-10-08T11:08:56","modified_gmt":"2025-10-08T11:08:56","slug":"defining-a-standard-taxonomy-for-segmentation-cisco-blog","status":"publish","type":"post","link":"https:\/\/dmsretail.com\/RetailNews\/defining-a-standard-taxonomy-for-segmentation-cisco-blog\/","title":{"rendered":"Defining a Standard Taxonomy for Segmentation \u2013 Cisco Blog"},"content":{"rendered":"<p> <p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/>\n<\/p>\n<div>\n<p>Segmentation has emerged as\u00a0a\u00a0foundational\u00a0technology\u00a0for cybersecurity teams around the world\u00a0as a way to\u00a0stop threats from spreading laterally through the network, mitigate their impact and enforce zero trust strategies.\u00a0\u00a0Dozens of\u00a0segmentation\u00a0solutions have flooded the marketplace \u2013 all claiming\u00a0the best approach for\u00a0defining,\u00a0identifying\u00a0and isolating\u00a0specific\u00a0workloads based on behavior and identity.<\/p>\n<p>The evolution\u00a0of segmentation\u00a0has been swift\u00a0\u2013 dizzying even.\u00a0And customers are having trouble breaking through the hype.\u00a0<em>What is the best segmentation approach for my organization? What solution best matches our needs? How do we\u00a0measure and\u00a0evaluate\u00a0our segmentation strategy? And how does segmentation align with business\u00a0objectives?<\/em><\/p>\n<p>As a result,\u00a0we\u2019re\u00a0launching\u00a0a new blog\u00a0series specifically focused on segmentation. Over the next several months,\u00a0we\u2019ll\u00a0explore use cases,\u00a0challenges\u00a0and strategies so you can compare,\u00a0deploy\u00a0and manage segmentation solutions more effectively across your diverse IT environments. We want you to make informed decisions \u2013 decisions that enhance overall security posture, support increasingly complex compliance efforts and\u00a0enhance\u00a0zero-trust security models.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-d30313b4fc7b2f432aa7ab80652b4c6f\" id=\"h-segmentation-is-evolving-to-meet-security-challenges-in-the-ai-world\" style=\"font-style:normal;font-weight:400\">Segmentation is Evolving to Meet Security Challenges in the AI World<\/h2>\n<p>Segmentation was developed decades ago\u00a0as a\u00a0way to\u00a0implement traffic management and\u00a0prevent\u00a0threats\u00a0from moving laterally across the network.\u00a0Since then, as digital transformation, distributed computing and\u00a0the\u00a0cloud have\u00a0changed the way we work, segmentation has evolved to allow security teams to\u00a0isolate specific workloads based on behavior or identity.<\/p>\n<p>This\u00a0ability to implement\u00a0micro-segmentation\u00a0at scale\u00a0has become\u00a0foundational to\u00a0modern\u00a0enterprise security strategies\u00a0and the zero trust security model\u00a0\u2013 enabling\u00a0the containment of breaches,\u00a0the\u00a0enforcement of\u00a0access policies and\u00a0improved\u00a0visibility\u00a0across increasingly complex IT environments and threat landscape.<\/p>\n<p>This is especially true in the age of AI.\u00a0Today\u2019s highly sophisticated threats\u00a0can\u00a0spread laterally across the network in a matter of seconds, and static segmentation policies are unable to respond quickly to evolving threats. New\u00a0AI-powered micro-segmentation\u00a0solutions can speed response times immensely.\u00a0Security teams have taken notice, embracing these micro-segmentation\u00a0tools\u00a0to stop attacks before they are able to spread throughout the network.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-dd9dc18cc82cf20db4919781a2073038\" id=\"h-a-communication-problem-for-vendors-integrators-and-customers\" style=\"font-style:normal;font-weight:400\">A Communication Problem for Vendors, Integrators and Customers<\/h2>\n<p>The evolution of segmentation\u00a0has created a vast ecosystem of various technologies,\u00a0methods,\u00a0infrastructures\u00a0and enforcement strategies\u00a0\u2013 contributing to much confusion in the marketplace.\u00a0Vendors and integrators use different terms,\u00a0push\u00a0different\u00a0approaches\u00a0and make conflicting promises. The resulting inability to\u00a0fully\u00a0grasp\u00a0the\u00a0subtleties of\u00a0segmentation\u00a0prevents organizations from having\u00a0fruitful conversations around segmentation needs,\u00a0challenges\u00a0and solutions \u2013\u00a0ultimately putting\u00a0segmentation projects at risk of\u00a0failure or\u00a0not\u00a0realizing their\u00a0full value.<\/p>\n<p>As cybersecurity\u00a0threats\u00a0continue to grow\u00a0in volume, sophistication and impact, organizations are going to need to get a better grasp of this foundational technology so they can make better decisions in line with business\u00a0objectives\u00a0and risk.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-c28809da6066090f1dc1e641999f5689\" id=\"h-let-s-nbsp-agree-on-a-standard-taxonomy-for-segmentation\" style=\"font-style:normal;font-weight:400\">Let\u2019s\u00a0Agree on a Standard Taxonomy for Segmentation<\/h2>\n<p>The first step is to standardize how we talk about\u00a0segmentation. A recent paper published\u00a0at\u00a0TechRxiv\u00a0takes a first stab at\u00a0defining a common taxonomy. Written by\u00a0a Cisco colleague, the paper\u00a0\u201cintroduces a taxonomy and shared vocabulary for discussing and comparing segmentation approaches across real-world deployment\u00a0contexts.\u201d<\/p>\n<p>Speaking the same language is important because it ensures that all stakeholders\u00a0are in agreement\u00a0about what is being discussed and how it is being discussed.\u00a0When someone uses a\u00a0label,\u00a0they are\u00a0assuming\u00a0their subjective interpretation\u00a0is the same as the audience\u2019s interpretation.\u00a0If\u00a0they\u00a0don\u2019t\u00a0align, miscommunication can occur, leading to\u00a0confusion,\u00a0disconnected\u00a0expectations and, often, hurt feelings. Standard taxonomies ensure that everyone\u00a0is speaking the same language, communication is\u00a0clear\u00a0and\u00a0everyone is aligned.<\/p>\n<p>Given the rapid evolution of segmentation, its\u00a0various types\u00a0and the use of jargon by vendors, segmentation is in desperate need of an established taxonomy. Fortunately, the\u00a0TechRxiv\u00a0paper does\u00a0a great job\u00a0of\u00a0organizing segmentation taxonomy, separating terms into three buckets:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>How Segments are Delineated<\/strong>:\u00a0The way\u00a0segments are defined is a critical differentiation between segmentation\u00a0types.\u00a0For example, using VLAN IDs\u00a0is considered macro-segmentation\u00a0as each VLAN acts as its own broadcast domain. Using 5-Tuples-based segments\u00a0(the source and destination IP addresses, the source and destination port numbers and the protocol ID)\u00a0works for both macro-\u00a0and micro-\u00a0segmentation.\u00a0<\/li>\n<li><strong>The\u00a0Infrastructure Over Which Segmentation is Deployed<\/strong>:\u00a0Segmentation also differs based on the underlying infrastructure.\u00a0This includes\u00a0public\u00a0cloud, private cloud, hybrid\u00a0cloud\u00a0and multi-cloud environments.<\/li>\n<li><strong>How\u00a0Enforcement\u00a0is\u00a0Implemented<\/strong>:\u00a0The way segmentation is enforced\u00a0also provides critical differentiation of segmentation types.\u00a0Permitting and blocking traffic\u00a0can be done at the workload level\u00a0(container network interface), close to it\u00a0(top-of-rack switches)\u00a0or away from it\u00a0(data center\u00a0firewall).<\/li>\n<\/ul>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1083\" height=\"2420\" data-lazy-type=\"image\" src=\"https:\/\/blogs.cisco.com\/gcs\/ciscoblogs\/1\/2025\/10\/taxonomy-3.webp\" alt=\"standard taxonomy for segmentation\" class=\"lazy lazy-hidden wp-image-479153\" style=\"width:609px;height:auto\"\/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"1083\" height=\"2420\" src=\"https:\/\/blogs.cisco.com\/gcs\/ciscoblogs\/1\/2025\/10\/taxonomy-3.webp\" alt=\"standard taxonomy for segmentation\" class=\"wp-image-479153\" style=\"width:609px;height:auto\"\/><\/noscript><\/figure>\n<\/div>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-483cbfcfe1ca4644f116fb634e32b3aa\" id=\"h-providing-customers-with-clarity\" style=\"font-style:normal;font-weight:400\">Providing Customers with Clarity<\/h2>\n<p>Segmentation\u00a0has evolved into a critical security tool that allows enterprises to\u00a0isolate specific workloads\u00a0based on behavior or identity\u00a0\u2013 providing a solid foundation for zero trust strategies. However, segmentation is a highly\u00a0fragmented\u00a0market\u00a0with\u00a0numerous\u00a0ways to define segments across\u00a0multiple\u00a0infrastructures with varying enforcement methods.\u00a0Matching\u00a0the right tool\u00a0to\u00a0each\u00a0job will require all stakeholders to come together to agree on a standard taxonomy for the technology. Only then will\u00a0organizations\u00a0gain the clarity they need to align their segmentation projects with business\u00a0objectives.<\/p>\n<p>I look forward to providing more content around segmentation in future posts.<strong>\u00a0<\/strong>In the meantime, take\u00a0a read of the\u00a0TechRxiv\u00a0paper.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p class=\"has-text-align-center\"><em>We\u2019d love to hear what you think! Ask a question and stay connected with Cisco Security on social media.<\/em><\/p>\n<p class=\"has-text-align-center\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-cisco-green-color\">Cisco Security Social Media<\/mark><\/strong><\/p>\n<p class=\"has-text-align-center\">LinkedIn<br \/>Facebook<br \/>Instagram<br \/><a href=\"https:\/\/twitter.com\/CiscoSecure\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a><\/p>\n<\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><script async defer src=\"https:\/\/platform.instagram.com\/en_US\/embeds.js\"><\/script><br \/>\n<br \/><p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Segmentation has emerged as\u00a0a\u00a0foundational\u00a0technology\u00a0for cybersecurity teams around the world\u00a0as a way to\u00a0stop threats from spreading laterally through the network, mitigate their impact and enforce zero [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16056,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-16055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/comments?post=16055"}],"version-history":[{"count":0,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16055\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media\/16056"}],"wp:attachment":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media?parent=16055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/categories?post=16055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/tags?post=16055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}