Anti-pattern 1: ‘Browse-up’ for administration
Anti-pattern 2: Management bypass
Anti-pattern 3: Back-to-back firewalls
Anti-pattern 4: Building an ‘on-prem’ solution in the cloud
Anti-pattern 5: Uncontrolled and unobserved third party access
Anti-pattern 6: The un-patchable system