Workload-based security deployment

In making a security protocol selection, an important consideration is the application workload to be protected. In order to illustrate this concept, it is helpful to understand where various protocols are implemented from a protocol layering perspective.
Figure 1. Security protocols from a protocol layering perspective
Security protocols by network protocol layer