Slide 9
Slide 9 text
PERIMETER
SECURITY
CHALLENGES
● There is no single, easily identifiable perimeter for the
enterprise: cloud, on-prem, multi-cloud, third-party
services, FaaS, artifact registries, etc.
● In the era of microservices the majority of the traffic is
East-West whereas perimeter security focus on
North-South.
● Ingress has to carry knowledge about the upstream
components (more security policies on the perimeter
firewall), leading to operational complexity,
misconfigurations, change management, timely policy
updates, etc.
● The guiding principle of perimeter security is "Trust but
Verify"
@jcchavezs
November 2023