Information Security Asked by sdgfsdh on February 2, 2021
I have AWS resources (e.g. EC2s, RDS instances) that I would like to isolate from each other so that if one is compromised, the potential damage is limited. I am most concerned about data leakage / exfiltration. I can group these resources into logical "areas". Some of the resources need access to the public internet. Some of the resources need API access to other resources in different areas. Occasionally, developers will need to make SSH connections to the resources via OpenVPN, so those keys might also be a security risk.
My understanding is that I can split my resources in a few ways:
What are the security implications of each approach?
0 Asked on October 28, 2021
1 Asked on October 28, 2021
2 Asked on October 28, 2021 by stalemate
4 Asked on October 28, 2021 by thump
1 Asked on October 28, 2021
2 Asked on October 28, 2021
2 Asked on October 28, 2021 by maikkeyy
3 Asked on October 28, 2021
0 Asked on October 28, 2021
authentication authorization instant messaging mobile mobile app
1 Asked on October 28, 2021 by flexi
1 Asked on October 28, 2021 by duane-murphy
1 Asked on October 28, 2021
1 Asked on October 28, 2021 by iknownaught
1 Asked on October 28, 2021 by will-pike
2 Asked on October 28, 2021 by martin-frholz
0 Asked on October 28, 2021 by none_none
0 Asked on October 28, 2021
4 Asked on October 28, 2021 by this-is-edis-mehmedovic
3 Asked on October 28, 2021 by arran-schlosberg
Get help from others!
Recent Answers
Recent Questions
© 2023 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP