官术网_书友最值得收藏!

WAN to LAN access patterns

When the primary source of legitimate connections to our application is the internet, the same will be true for any malicious packets. Any time an application is internet facing, it will need to be protected with as many mechanisms as possible.

Initially, we will need to determine what type of traffic is being sent between the internet and the local network to determine how to secure our application. We should also be aware of the underlying IP protocols in regard to both secure the IPv4 and IPv6 protocols with the same mechanisms.

After analyzing the traffic, we should focus on minimizing the footprint of the attack. This means that we should disable any unnecessary access and limit the incoming traffic only to the legitimate sources. For example, when using an ELB, we should always build a security group that only allows access to the ELB IP instead of both the ELB and the instances it load balances traffic to. The instances should only be accessible from the ELB itself. It is easy to implement this with security groups, as we will see later in this chapter.

主站蜘蛛池模板: 米泉市| 红原县| 三都| 清水河县| 伊宁市| 云和县| 天水市| 阿拉善盟| 张家界市| 遵化市| 徐州市| 从化市| 江津市| 仙桃市| 泰安市| 会理县| 安塞县| 屏东县| 玛多县| 石阡县| 滕州市| 新兴县| 平陆县| 高雄县| 垫江县| 井研县| 淅川县| 迁西县| 京山县| 奉新县| 建平县| 五原县| 静宁县| 工布江达县| 桃江县| 奉化市| 嘉黎县| 永川市| 政和县| 晋中市| 昆山市|