As you review this architecture, focus on where natural boundaries exist. These boundaries provide isolation, a potential security opportunity. The boundaries come in many forms, and as described in many places in this book, more layers can provide a greater depth of security. Therefore, every one of these boundaries could be implemented to improve the security of the system. Watch for terms such as the following that identify boundaries within the architecture:
The goal is to find ways to separate high-value, highly trusted processes and data from lower-value, less-trusted ...