More Network Security Thoughts:
#AssumeBreach
Don't just threat model based upon ingress network traffic to surface area
Design from the standpoint that infrastructure is assumed to get breached and limit exposure to other resources.
We used to do this with 'DMZs' but that concept is largely obsolete in the modern era --
If you can, leverage host-based firewalls to prohibit inbound remote-admin connections except from trusted source-subnets
I shouldn't be able to play ssh/rdp/powershell hop-scotch across your backend network from a webapp server to another.