It's bad.

All you have to do is penetrate the perimeter, and then you're in.

Pervasive security processes throughout the organisation are a much better idea.