Network perimeters, segmentation, and private access are customer-owned architecture choices built on top of provider networking primitives.
Network perimeters, segmentation, and private access are customer-owned architecture choices built on top of provider networking primitives. The provider supplies accounts, virtual networks, subnets, routes, private endpoints, and peering capabilities. The customer decides how those pieces are assembled into meaningful trust boundaries.
This distinction matters because provider-operated networking does not mean provider-designed segmentation. If a production workload is flat, if internal services are reachable from places they should not be, or if sensitive data paths cross public networks unnecessarily, those are usually customer-side design failures rather than provider backbone failures.
The segmentation model often looks like this:
flowchart TD
A["Customer network design"] --> B["Internet-facing perimeter"]
A --> C["Private application subnet"]
A --> D["Data subnet"]
A --> E["Private endpoint to managed service"]
B --> C
C --> D
C --> E
What to notice:
Strong segmentation normally aims to:
These outcomes do not emerge automatically from having a virtual network. They come from deliberate customer design.
1network_layout:
2 edge_subnet:
3 purpose: ingress-and-api-gateway
4 public_access: limited
5
6 app_subnet:
7 purpose: internal-services
8 public_access: none
9
10 data_subnet:
11 purpose: databases-and-stateful-services
12 public_access: none
13
14 private_endpoints:
15 - object-storage
16 - managed-database
What this demonstrates:
Teams often say a service is internal as if that were a complete protection model. It is not. Internal services still need scope, segmentation, and trust rules. In many cloud breaches, the problem is not that the service was on the public internet. The problem is that the internal network was too permissive once any foothold existed.
A team says its databases are secure because they are not publicly exposed. The databases are still reachable from most application subnets, several administrative paths, and a shared non-production network segment. Is that strong segmentation?
No. The stronger answer is that private-only reachability is useful, but meaningful segmentation requires narrowing which internal paths and identities can actually reach the data layer. Private is a starting point, not a complete boundary model.