Along with on-premises networks and systems that access AWS resources, it is what most customers think of as the perimeter of “my AWS”. The perimeter defines the things you “intend” or “expect” to happen. It refers to the access patterns among your identities, resources, and networks that should be allowed.
What does perimeter security do?
Perimeter security is designed with the primary purpose to either keep intruders out or captives contained within the area the boundary surrounds. Both natural and manmade barriers can serve as perimeter security.
What is perimeter security in cloud?
The network perimeter is the boundary between an organization's secured internal network and the Internet — or any other uncontrolled external network.
What are the components of perimeter security?
Perimeter security can include video detection, intrusion detection, access control, security fencing and gates, and barriers and bollards.
What does the security perimeter consists of?
Perimeter means outer boundary, and it is often the property line and the first line of defense against unauthorized access (see Figure 8-1). Building access points such as doors and windows also are considered part of perimeter defenses at many locations.