The first step in
<a href="https://www.extnoc.com/learn/computer-security/what-is-micro-segmentation">micro-segmentation security
</a> is to identify what kind of traffic needs to be protected. For example, if you want to protect web applications from DDoS attacks, you might look at the HTTP headers, URL path, and application code. If you want to protect against malware, you might look at file extensions, user agent strings, and IP addresses. Once you know which types of traffic require protection, you can start looking at the different ways to implement it.