Internal networks and tools with restricted access, assuming they are properly firewall-ed and segmented from external access.This helps protect against unauthorized use that may be unnoticed by those responsible for protecting the integrity of the server.Because each transaction on the HTTP protocol is carried out independently of the others and w