Access Path
A path is required at the barrier or perimeter for a number of reasons: reachability to/from destination with legitimate needs such as logistics, transport etc.
In cyber world, network perimeter device protects the inside zone from outside but "holes" are still required. A common example is the access to the web site from outside.
How do we stay secure? It requires orchestration from different aspects: configuration hardening, access control to resources, incident respond, resilience, regular security updates, situation awareness and most important an achievable cyber security policy to mandate all these are in place.
...