Boundary Protection | Isolation of Security Tools / Mechanisms / Support Components
System and Communications Protection Policy for cloud.gov
18F practices defense in depth in layers. Sensistive security tools are logically isolated by well defined VPC boundries between internal system boundaries. Additionally third-party approved tools are used which are accessed via authenticated API keys over encrypted connections such as HTTPS.