Skip to main content

Building an AWS Perimeter

This paper discusses perimeter boundaries in terms of preventing unintended access patterns.

Download PDF