on protecting a single outer layer, apply a defense-in-depth approach with other security controls. • Apply to all layers, for example, edge network, virtual private cloud (VPC), subnet, load balancer, every instance, operating system, and application. Design Principles 31