Security
Goals
- Privacy
- Protection agaist DDoS
Network
- Firewall for ingress
- Lack of public API
- Bastion host pattern
- NAT Gateway for egress traffic
- VPNs
- IPsec
- software based (openVPN)
- Multiple subnetworks (AWS way)
- only load balancer has public IP
- load balancer could communicate only with web server
- web server could only communicate with application server
- only application servers can communicate with database
- Multiple NIC on different networks (GCP way)
- server A has nic1 in subnet1
- server B has nic1 in subnet2
- server C has nic1 in subnet1 and nic2 and subnet2
- as a result A could not talk to B, but both of them could task to C
- Encrypt data in transit and at rest
DDoS
- Types
- Bandwidth (DNS amplification)
- Connection
- Resources
- Application insight
- Protection
- minimize the attack surface area and safeguard exposed resources and prevent cascading failure.
- autoscaling
- if we are on premise we could route some part of the traffic to major cloud provider (AWS) which could handle it.
- proxy traffic through 3d party provider
- send traffic to some external provider, who has higher capacity (e.g. CDN)
- caching
IAM and auditing
- Audit cloud / infrastructure API access