Which of the following is a fundamental principle of network perimeter defense as it applies to Certified Cybersecurity Professional?