Extensive perimeter coverage

Inefficient access control management