官术网_书友最值得收藏!

Controlling access to applications

To completely control access to the applications, we will use a multi layer, multi firewall, multi solution approach. The types and number of security barriers between the application and the internet will, of course, differ from application to application.

In AWS, we have most of the tools that will give us the ability to implement control at each and every point of access and build as many security barriers as it makes sense to make. Remember, security is like an onion – it should have many layers and it should make the person trying to peel the layers cry more and more!

Now, let's take a look at what security components AWS makes available and how we can implement them.

主站蜘蛛池模板: 鄂尔多斯市| 江源县| 芷江| 南昌县| 辽中县| 独山县| 阳西县| 阿拉善盟| 阿克| 穆棱市| 美姑县| 霍城县| 岳池县| 定日县| 彰化县| 井陉县| 江津市| 楚雄市| 曲阜市| 红河县| 开江县| 衡阳县| 石家庄市| 长乐市| 江都市| 洪洞县| 呼伦贝尔市| 嘉义市| 固原市| 高密市| 肥乡县| 康保县| 格尔木市| 辽宁省| 南溪县| 江西省| 兰考县| 攀枝花市| 大港区| 墨竹工卡县| 馆陶县|