Boundaries

Access Prevention can be realized by leveraging boundaries. Each subnet represents a collection of resources having the same level of protection. Microservices can utilize given boundaries to realize security requirements. Security Architects can leverage the following boundaries to protect subnets via perimeter checks:

  • Firewalls
  • Gateways
  • Routers
  • Guards
  • Malicious Code Analysis 
  • Virtualization Systems
  • Encrypted tunnels
  • Demilitarized Zones

devops/2017-09-10%20System%20Boundaries.svg