官术网_书友最值得收藏!

WAN to LAN access patterns

When the primary source of legitimate connections to our application is the internet, the same will be true for any malicious packets. Any time an application is internet facing, it will need to be protected with as many mechanisms as possible.

Initially, we will need to determine what type of traffic is being sent between the internet and the local network to determine how to secure our application. We should also be aware of the underlying IP protocols in regard to both secure the IPv4 and IPv6 protocols with the same mechanisms.

After analyzing the traffic, we should focus on minimizing the footprint of the attack. This means that we should disable any unnecessary access and limit the incoming traffic only to the legitimate sources. For example, when using an ELB, we should always build a security group that only allows access to the ELB IP instead of both the ELB and the instances it load balances traffic to. The instances should only be accessible from the ELB itself. It is easy to implement this with security groups, as we will see later in this chapter.

主站蜘蛛池模板: 新乡县| 信阳市| 屏东县| 调兵山市| 光山县| 伊川县| 高密市| 斗六市| 永靖县| 昂仁县| 丰城市| 漠河县| 双牌县| 泸水县| 沾化县| 宁南县| 科尔| 襄汾县| 依安县| 德兴市| 大邑县| 永登县| 乌海市| 瓦房店市| 新竹县| 大荔县| 武隆县| 怀宁县| 翼城县| 崇州市| 固阳县| 盐源县| 习水县| 米泉市| 高台县| 抚顺市| 嘉祥县| 雅江县| 石阡县| 长沙县| 茶陵县|