Feb 6, 2019
The practice of putting controls in place that isolate one application level from another, creating a secure separation between the parts of an application to reduce attack exposure.