Each house has its own perimeter to control entry. However behind the perimeter, they are mutually accessible at the back end. Thus, break-in to one house will allow intruder transverse to its neighbor without going thru the neighbor’s perimeter.
Same attack surface applies in the cyber world. Therefore, test and live environments must be segregated. The former is less cyber hygiene because it is subject to broader access by developer or vendor with loose controls.