Yasmin works as a cloud security engineer and is designing a cloud-based architecture. She wants to ensure secure communication between its virtual machines (VMs) and external networks. Which of the following networking components should the company implement to manage and enforce security rules for inbound and outbound traffic?