Trends

DMZ Network: Definition, working principles and benefits

Public websites need accessible web servers, separated from internal networks in a DMZ with strong security measures.

DMZ

Headline

Public websites need accessible web servers, separated from internal networks in a DMZ with strong security measures.

Context

This article will introduce the definition, working principles and benefits of DMZ network. A DMZ , also known as a demilitarised zone, serves as an intermediary network that shields an organisation’s internal LAN from untrusted traffic, bolstering security. The primary objective of a DMZ network is to enable access to untrusted networks like the internet while safeguarding the security of the organisation’s private LAN . Typically, external-facing services and essential servers such as DNS, FTP, mail, proxy, VoIP, and web servers are housed within the DMZ for enhanced security measures.

Evidence

Pending intelligence enrichment.

Analysis

Also read: 3 key security risks of cloud computing Also read: The most pressing cybersecurity threats Businesses operating public websites for customer use need their web servers accessible on the internet. To safeguard their internal corporate networks, these web servers are deployed on separate computers isolated from internal resources. The DMZ facilitates secure communication between protected business assets, like internal databases, and authorised traffic from the internet. A DMZ network acts as a buffer between the internet and the organisation’s private network, secured by a firewall or similar security gateway that filters traffic between the DMZ and the LAN. The DMZ typically includes servers protected by another firewall that filters incoming traffic from external networks. Ideally positioned between two firewalls, the DMZ setup ensures that incoming network packets are scrutinised by security measures before reaching servers hosted within the DMZ. This setup imposes an additional layer of defence: even if an attacker breaches the external firewall, they must then compromise the hardened services within the DMZ before gaining access to critical business systems. In the event of a breach where an attacker penetrates the external firewall and compromises a DMZ system, they must still navigate through an internal firewall to reach sensitive corporate data. Although skilled attackers might breach a secure DMZ, internal resources within it should trigger alerts, providing early warning of any ongoing breach. Organisations adhering to regulatory requirements, such as HIPAA, may deploy a proxy server in the DMZ. This simplifies monitoring and recording of user activity, centralises web content filtering, and ensures employees access the internet securely through controlled systems.

Key Points

  • A demilitarised zone is a perimeter network that shields an organisation’s internal LAN from untrusted traffic
  • Public websites need accessible web servers, separated from internal networks in a DMZ with strong security measures.

Actions

Pending intelligence enrichment.

Author

Audrey Huang (a.huang@btw.media)· author profile pending