Slide 9
Slide 9 text
PERIMETER
SECURITY
CHALLENGES
● There is no single, easily identifiable perimeter for the
enterprise: cloud, on-prem, multi-cloud, third-party
services, FaaS, artifact registries, etc.
● In the times of microservices the majority of the traffic
is East-West whereas perimeter security focus on
North-South.
● Gateways have to carry knowledge about the upstream
components which ends up in adding more security
policies on the perimeter firewall, leading to
operational complexity, misconfigurations, change
management, timely policy updates, etc.
● The guiding principle of perimeter security is "Trust but
Verify"
@jcchavezs