Insufficient Attack Protection
We must always assume that attackers have unlimited access to other machines behind the firewall.
pattern: track illegitimate requests by their origin pattern: log bad requests by source principal pattern: use API Gateways to block callers by API key pattern: use API Gateways to throttle request rate by API key
(src: