Julio Diez
Jan 7, 2021

I see some value on restricting IPs but I wanted to stress this point because it's special. Using this feature could make you think you are safe from Internet attacks which is not true. Would you worry differently if the attack comes from "Internet" or e.g. disposable AWS/GCP VMs? They are not a different threat.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Julio Diez
Julio Diez

Written by Julio Diez

Strategic Cloud Engineer at Google Cloud, focused on Networking and Security

No responses yet

Write a response