Slide 10
Slide 10 text
OWASP CORAZA
WEB APPLICATION FIREWALL
● There is no single, easily identifiable perimeter for the enterprise:
cloud, on-prem, multi-cloud, third-party services, FaaS, artifact
registries, etc.
● In the times of microservices the majority of the traffic is East-West
whereas perimeter security focus on North-South.
● Gateways have to carry knowledge about the upstream components
which ends up in adding more security policies on the perimeter
firewall, leading to operational complexity, misconfigurations,
change management, timely policy updates, etc.
● The guiding principle of perimeter security is "Trust but Verify"
@jcchavezs