官术网_书友最值得收藏!

Layer 7

With applications becoming more sophisticated every day, we also need to start thinking about more sophisticated ways to protect our applications. At the application layer, we need a device that understands the application and the type of traffic that will be flowing to and from the application. Application firewalling is perhaps the most difficult and wide-ranging subject, and there are numerous ways to approach it. AWS offers WAF, which can help with securing web applications, but there are also other third-party solutions for different application types and for centralized security that's been designed by mainstream firewall vendors and is available from the AWS Marketplace.

As you can see, network security has many different aspects to take into consideration. When designing network security for our application, we need to consider any and all connection points of our application and think about which types of communication protocols we will be using. We should then map these protocols to the OSI network layers to discover the vulnerabilities we might be introducing. Finally, once we have categorized our potential weaknesses, we need to implement appropriate security solutions for each and every layer. In the following sections, we will take a look at how to design our AWS services with security in mind and how to implement security for our application at all the relevant OSI layers.

主站蜘蛛池模板: 和顺县| 南雄市| 福鼎市| 安徽省| 稻城县| 桐庐县| 调兵山市| 刚察县| 辉县市| 浠水县| 沾化县| 咸丰县| 乡城县| 凌源市| 南皮县| 茂名市| 古丈县| 嘉定区| 石泉县| 绥宁县| 白沙| 南召县| 巴马| 通榆县| 元阳县| 垣曲县| 上饶县| 天津市| 阳信县| 荆州市| 华宁县| 克什克腾旗| 周至县| 乐平市| 八宿县| 进贤县| 仁怀市| 陇川县| 陕西省| 丹棱县| 息烽县|