home/dictionary/Demilitarized zone

Demilitarized zone

nouncandidate·updated May 12, 2026

Perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network’s Information Assurance policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks.

Framework senses

SANS Glossary of Security Terms1 senseview framework →
§1
In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a subnetwork) that sits between an organization's internal network and an external network, usually the Internet. DMZ's help to enable the layered security model in that they provide subnetwork segmentation based on security requirements or policy. DMZ's provide either a transit mechanism from a secure source to an insecure destination or from an insecure source to a more secure destination. In some cases, a screened subnet which is used for servers accessible from the outside is referred to as a DMZ.
ISACA Cybersecurity Glossary1 senseview framework →
§1
A screened (firewalled) network segment that acts as a buffer zone between a trusted and untrusted network Scope Note: A DMZ is typically used to house systems such as web servers that must be accessible from both internal networks and the Internet.
NISTIR 7298: Glossary of Key Information Security Terms, Revision 23 sensesview framework →
§1
An interface on a routing firewall that is similar to the interfaces found on the firewall’s protected side. Traffic moving between the DMZ and other interfaces on the protected side of the firewall still goes through the firewall and can have firewall protection policies applied.
§2 · sense_2_pending_review
A host or network segment inserted as a “neutral zone” between an organization’s private network and the Internet.
§3 · sense_3_pending_review
Perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network’s Information Assurance policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks.
CNSSI-4009 (Glossary of Information Assurance Terms)1 senseview framework →
§1
Perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network’s Information Assurance policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks.
NIST SP 800-411 senseview framework →
§1
An interface on a routing firewall that is similar to the interfaces found on the firewall’s protected side. Traffic moving between the DMZ and other interfaces on the protected side of the firewall still goes through the firewall and can have firewall protection policies applied.
NIST SP 800-451 senseview framework →
§1
A host or network segment inserted as a “neutral zone” between an organization’s private network and the Internet.