One of the most foundational ways to accomplish this is through the use of network security zones, which we'll take a look at in this blog post. We'll cover common security zone types, and also zone filtering policy considerations for each.
Firewall Security Zones – Zone based Policy Firewall ZPF
Zone Segmentation In A Office Network (Local Network Security)
Palo Alto Lesson: 2.8 Security zones and interfaces
Network Segmentation - OWASP Cheat Sheet Series
The cost of failure to implement network security zones.
Standard Model of System Architecture of Enterprise IT
Security Zone Design - CloudCampus Solution V100R020C10 Design and Deployment Guide for Large- and Medium-Sized Campus Networks (Non-virtualization Scenario) - Huawei
Cybersecurity Strategies Critical To Production Operations
webserver - What is the best practice for placing database servers in secure network topologies - Information Security Stack Exchange
OpenShift and Network Security Zones: Coexistence Approaches
Egress Network Planning, Service Deployment Planning