Given traffic control requirements, determine when and how to use security groups and network ACLs.