As a cloud security architect, you are designing a network architecture for a cloud environment that will host sensitive applications. To enhance the security posture, you need to implement a network design principle that is commonly used in traditional data centers. Which of the following principles should you prioritize to ensure the effective segmentation and isolation of network resources in the cloud?