Traffic paths (network segments)
To stop malicious activity across your cloud infrastructure, applications, and services, you need to secure both the perimeter (ingress and egress, or north-south traffic) and lateral traffic (east-west).
Ingress covers traffic initiated by another location to your cloud workloads. Examples include general public access to a website or application, and partner access to an API gateway. The direction is inbound and client-initiated. Securing ingress traffic protects your cloud applications from internet-facing attacks and unauthorized external access.
Egress covers workloads initiating traffic to somewhere else, or what your cloud deployment needs to access to perform an operation or function. Examples of access include external payment gateways, API-based services, SaaS services, software updates, and external URLs. The direction is outbound and initiated on the application side. Securing egress protects applications from threats such as malware (by preventing command-and-control or C2 action) and data exfiltration.
East-west covers inter-VPC traffic within the cloud environment or on-premises (hybrid). Examples include communications such as inter-region, endpoint services, private links, or PaaS (Platform as a Service) constructs. These can be client or server-initiated. Securing east-west traffic prevents lateral movements of threats within your cloud infrastructure.