- Mastering AWS Security
- Albert Anthony
- 97字
- 2021-07-02 15:44:05
Secure network architecture
AWS has network devices such as a firewall to monitor and control communications at the external and key internal boundaries of the network. These network devices use configurations, access control lists (ACL) and rule sets to enforce the flow of information to specific information system services. Traffic flow policies or ACLs are established on each managed interface that enforces and manage traffic flow. These policies are approved by Amazon information security. An ACL management tool is used to automatically push these policies, to help ensure these managed interfaces enforce the most up-to-date ACLs.
推薦閱讀
- SQL Server 2012數據庫技術及應用(微課版·第5版)
- Developing Mobile Web ArcGIS Applications
- HoloLens Beginner's Guide
- Julia機器學習核心編程:人人可用的高性能科學計算
- 用戶體驗可視化指南
- Mastering Git
- Solr Cookbook(Third Edition)
- C#程序設計教程(第3版)
- Learning YARN
- CRYENGINE Game Development Blueprints
- 從零開始學Android開發
- Getting Started with Electronic Projects
- 快樂編程:青少年思維訓練
- Raspberry Pi Blueprints
- JBoss AS 7 Development