- AWS Certified Advanced Networking:Specialty Exam Guide
- Marko Sluga
- 191字
- 2021-06-24 14:14:53
WAN to LAN access patterns
When the primary source of legitimate connections to our application is the internet, the same will be true for any malicious packets. Any time an application is internet facing, it will need to be protected with as many mechanisms as possible.
Initially, we will need to determine what type of traffic is being sent between the internet and the local network to determine how to secure our application. We should also be aware of the underlying IP protocols in regard to both secure the IPv4 and IPv6 protocols with the same mechanisms.
After analyzing the traffic, we should focus on minimizing the footprint of the attack. This means that we should disable any unnecessary access and limit the incoming traffic only to the legitimate sources. For example, when using an ELB, we should always build a security group that only allows access to the ELB IP instead of both the ELB and the instances it load balances traffic to. The instances should only be accessible from the ELB itself. It is easy to implement this with security groups, as we will see later in this chapter.
- 機器學習實戰:基于Sophon平臺的機器學習理論與實踐
- 網上生活必備
- 離散事件系統建模與仿真
- 人工智能工程化:應用落地與中臺構建
- 現代機械運動控制技術
- WordPress Theme Development Beginner's Guide(Third Edition)
- AWS Administration Cookbook
- 智能生產線的重構方法
- 新編計算機圖形學
- 奇點將至
- 單片機原理實用教程
- PowerMill 2020五軸數控加工編程應用實例
- Visual Basic項目開發案例精粹
- Hadoop Beginner's Guide
- Microsoft System Center Data Protection Manager Cookbook