- Network access cannot be controlled
- By using network ACLs
- By authorizing specific security groups
- By enabling VPC peering