🚀
Ten Factor Infrastructure
HomeGet StartedFeatures & Plan
  • 👋Overview
  • The Ten Factors
    • 1️⃣Network
      • Segregated Network
      • Perimeter Security
      • Single Secure Entrypoint
      • Dedicated Peer-to-peer Connection
    • 2️⃣System
    • 3️⃣Storage
    • 4️⃣Identity Management
    • 5️⃣Logging
    • 6️⃣Monitoring
    • 7️⃣Security
    • 8️⃣Availability
    • 9️⃣Disaster Recovery
    • 🔟Environment On Demand
Powered by GitBook
On this page

Was this helpful?

  1. The Ten Factors
  2. Network

Perimeter Security

Now going back to my house construction example, now we are the fencing mode. So we need to build a boundary wall with a gateway trusted access. So to secure our Perimeter first up we need

  • Network Policies based on whitelisting.

  • Deny All by default.

  • Apply ports/protocol level filters.

  • Do not allow any to any.

  • System to system access policy with firewall rules or network policies.

  • Sometimes some cloud providers tend to add external Ip sources on the network policies or security groups of the services managed by them for monitoring, management or security scanning.

  • Make sure you validate the whitelisted sources as trusted ones. For example: cloud managed database service or managed kubernetes service or vulnerability scanners. Make sure to confirm these sources with your cloud provider.

PreviousSegregated NetworkNextSingle Secure Entrypoint

Last updated 2 years ago

Was this helpful?

1️⃣