Use Access Control List (ACL) and Private End Points