Network Security: The Complete Guide for Compliance and Security Teams
2026-03-08
By Emre Salmanoglu

Network Security: The Complete Guide for Compliance and Security Teams

Learn how to implement network security controls that satisfy ISO 27001, SOC 2, NIS2, and DORA. Covers firewalls, segmentation, IDS/IPS, VPN, DNS security, and compliance evidence.

network security
firewalls
network segmentation
IDS/IPS
compliance

What Is Network Security?

Network security is the discipline of protecting an organisation's network infrastructure, the data travelling across it, and the resources connected to it. It encompasses the technologies, policies, and practices that prevent unauthorised access, detect threats, and ensure the integrity and availability of network services.

Modern network security has evolved beyond the castle-and-moat model. Today's approach combines perimeter controls, internal segmentation, encrypted communications, continuous monitoring, and zero-trust principles to protect increasingly distributed and cloud-hybrid environments.

Network Security Control Layers

LayerControlsPurpose
PerimeterNext-gen firewalls, WAF, DDoS protection, email gatewaysBlock external threats at the boundary
SegmentationVLANs, micro-segmentation, security groups, NACLsLimit lateral movement and blast radius
Access controlNAC, 802.1X, VPN, ZTNAControl who and what connects to the network
EncryptionTLS/mTLS, IPsec VPN, WPA3Protect data in transit
MonitoringIDS/IPS, NetFlow, packet capture, DNS loggingDetect threats and anomalies
ManagementConfiguration management, change control, documentationMaintain security posture and audit evidence

Firewall Evolution

GenerationTechnologyCapabilitiesLimitations
Packet filterStateless ACLsPort/IP-based filteringNo session awareness
Stateful inspectionConnection trackingSession-aware filteringNo application awareness
NGFWDeep packet inspectionApplication, user, and content awarenessPerformance impact from DPI
Cloud-native firewallService-native controlsAPI-driven, auto-scaling, integratedProvider-specific, limited cross-cloud
SASE/SSECloud-delivered securityUnified network + security, identity-awareVendor dependency, latency concerns

Network Segmentation

Segmentation Strategies

StrategyImplementationSecurity BenefitComplexity
VLAN-basedLayer 2 separation with routed inter-VLAN accessBasic network isolationLow
Firewall zonesSeparate zones with firewall policies between themControlled inter-zone accessMedium
Micro-segmentationPer-workload policies using software-defined networkingGranular east-west controlHigh
Zero-trust segmentationIdentity-based policies regardless of network locationNetwork-agnostic securityHigh

Recommended Zones

ZoneContainsAccess Policy
DMZPublic-facing services (web servers, APIs)Internet ingress, limited internal egress
Application tierApplication servers, middlewareDMZ to app tier, app tier to data tier only
Data tierDatabases, file storageApplication tier access only, no direct internet
ManagementJump boxes, admin tools, monitoringRestricted admin access, MFA required
User networkEmployee workstationsSegmented by department, internet via proxy
IoT/OTIndustrial and IoT devicesIsolated, minimal connectivity

Network Monitoring

TechnologyWhat It MonitorsDetection Capability
IDS/IPSTraffic patterns, known attack signaturesKnown attacks, protocol anomalies
NetFlow/IPFIXTraffic metadata (source, destination, volume)Traffic anomalies, data exfiltration
Full packet captureComplete network trafficDeep forensic investigation
DNS loggingDNS queries and responsesC2 communication, data exfiltration via DNS
SSL/TLS inspectionDecrypted traffic contentEncrypted threats, data loss
Network behaviour analysisBaseline deviation detectionInsider threats, novel attacks

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2NIS2DORA
Network security controlsA.8.20CC6.6Art. 21(2)(d)Art. 9(2)
Network segmentationA.8.22CC6.1Art. 21(2)(d)Art. 9(2)
Web filteringA.8.23CC6.6Art. 21(2)(d)Art. 9(2)
Encryption in transitA.8.24CC6.7Art. 21(2)(d)Art. 9(2)
Network monitoringA.8.16CC7.2Art. 21(2)(b)Art. 10
Firewall managementA.8.20CC6.6Art. 21(2)(d)Art. 9(2)
Remote access securityA.8.20CC6.1Art. 21(2)(d)Art. 9(4)(d)

Audit Evidence

Evidence TypeDescriptionFramework
Network architecture diagramCurrent topology showing zones, controls, data flowsAll frameworks
Firewall rule setsDocumented rules with business justificationAll frameworks
Firewall change recordsChange tickets with approval and reviewISO 27001, SOC 2
Segmentation validationPenetration test or scan proving isolationISO 27001, NIS2
IDS/IPS deployment reportCoverage and alert handling proceduresAll frameworks
VPN/remote access policyDocumented policy for remote connectivityAll frameworks
Network security scan resultsRegular vulnerability scans of network devicesAll frameworks

Common Mistakes

MistakeRiskFix
Flat network with no segmentationAttacker moves freely once insideImplement network segmentation by function and data sensitivity
Firewall rules never reviewedRule bloat, overly permissive accessReview firewall rules quarterly, remove unused rules
No east-west monitoringLateral movement goes undetectedDeploy IDS and NetFlow monitoring on internal segments
Unencrypted internal trafficData interception on internal networkEncrypt all traffic with TLS, especially between services
Ignoring DNS securityDNS used for C2 and data exfiltrationImplement DNS filtering, logging, and DNSSEC
No network device hardeningDefault credentials and unnecessary servicesApply CIS Benchmarks for network devices

How Orbiq Supports Network Security Compliance

Orbiq helps you demonstrate network security controls:

  • Evidence collection — Centralise network diagrams, firewall rules, and scan results
  • Continuous monitoring — Track network security control effectiveness
  • Trust Center — Share your network security posture via your Trust Center
  • Compliance mapping — Map network controls to ISO 27001, SOC 2, NIS2, and DORA
  • Audit readiness — Pre-built evidence packages for auditor review

Further Reading