Micro-fortresses everywhere: The cloud security model and the software-defined perimeter