Perimeter Security
Now going back to my house construction example, now we are the fencing mode. So we need to build a boundary wall with a gateway trusted access. So to secure our Perimeter first up we need
Network Policies based on whitelisting.
Deny All by default.
Apply ports/protocol level filters.
Do not allow any to any.
System to system access policy with firewall rules or network policies.
Sometimes some cloud providers tend to add external Ip sources on the network policies or security groups of the services managed by them for monitoring, management or security scanning.
Make sure you validate the whitelisted sources as trusted ones. For example: cloud managed database service or managed kubernetes service or vulnerability scanners. Make sure to confirm these sources with your cloud provider.
Last updated
Was this helpful?