Building an AWS Perimeter This paper discusses perimeter boundaries in terms of preventing unintended access patterns. Expand Fullscreen Exit Fullscreen Download PDF Expand Fullscreen