官术网_书友最值得收藏!

WAN to LAN access patterns

When the primary source of legitimate connections to our application is the internet, the same will be true for any malicious packets. Any time an application is internet facing, it will need to be protected with as many mechanisms as possible.

Initially, we will need to determine what type of traffic is being sent between the internet and the local network to determine how to secure our application. We should also be aware of the underlying IP protocols in regard to both secure the IPv4 and IPv6 protocols with the same mechanisms.

After analyzing the traffic, we should focus on minimizing the footprint of the attack. This means that we should disable any unnecessary access and limit the incoming traffic only to the legitimate sources. For example, when using an ELB, we should always build a security group that only allows access to the ELB IP instead of both the ELB and the instances it load balances traffic to. The instances should only be accessible from the ELB itself. It is easy to implement this with security groups, as we will see later in this chapter.

主站蜘蛛池模板: 城步| 吴桥县| 运城市| 昌都县| 班戈县| 兴隆县| 山阳县| 乡城县| 忻州市| 永定县| 额敏县| 哈尔滨市| 五家渠市| 克什克腾旗| 伊通| 肇东市| 都匀市| 余姚市| 长顺县| 富蕴县| 开原市| 垦利县| 凭祥市| 陆丰市| 炉霍县| 三穗县| 普格县| 富源县| 新龙县| 靖安县| 郧西县| 正宁县| 尖扎县| 广南县| 大冶市| 双牌县| 樟树市| 徐州市| 六安市| 五河县| 迭部县|