- Mastering AWS Security
- Albert Anthony
- 97字
- 2021-07-02 15:44:05
Secure network architecture
AWS has network devices such as a firewall to monitor and control communications at the external and key internal boundaries of the network. These network devices use configurations, access control lists (ACL) and rule sets to enforce the flow of information to specific information system services. Traffic flow policies or ACLs are established on each managed interface that enforces and manage traffic flow. These policies are approved by Amazon information security. An ACL management tool is used to automatically push these policies, to help ensure these managed interfaces enforce the most up-to-date ACLs.
推薦閱讀
- C# 2012程序設(shè)計(jì)實(shí)踐教程 (清華電腦學(xué)堂)
- Java面向?qū)ο笏枷肱c程序設(shè)計(jì)
- 少年輕松趣編程:用Scratch創(chuàng)作自己的小游戲
- Easy Web Development with WaveMaker
- Mastering macOS Programming
- Learning Laravel's Eloquent
- 西門子S7-200 SMART PLC編程從入門到實(shí)踐
- Vue.js 3應(yīng)用開發(fā)與核心源碼解析
- 小程序從0到1:微信全棧工程師一本通
- jQuery技術(shù)內(nèi)幕:深入解析jQuery架構(gòu)設(shè)計(jì)與實(shí)現(xiàn)原理
- Access數(shù)據(jù)庫應(yīng)用教程(2010版)
- Get Your Hands Dirty on Clean Architecture
- Flutter之旅
- PHP 7 Programming Blueprints
- CISSP in 21 Days(Second Edition)