🚀
Ten Factor Infrastructure
HomeGet StartedFeatures & Plan
  • 👋Overview
  • The Ten Factors
    • 1️⃣Network
      • Segregated Network
      • Perimeter Security
      • Single Secure Entrypoint
      • Dedicated Peer-to-peer Connection
    • 2️⃣System
    • 3️⃣Storage
    • 4️⃣Identity Management
    • 5️⃣Logging
    • 6️⃣Monitoring
    • 7️⃣Security
    • 8️⃣Availability
    • 9️⃣Disaster Recovery
    • 🔟Environment On Demand
Powered by GitBook
On this page

Was this helpful?

  1. The Ten Factors
  2. Network

Segregated Network

To secure connectivity Network should be segregated or subnetted with respect to incoming and outgoing access.

As in the house design example above, you have your living room accessible to all incoming people, bedroom is private to you, kitchen is visible to your guests however operated by you. Likewise identify the privacy layers in your network -

  • Is it Public , allowing ingress traffic from outside, or Private that is no incoming and outgoing internet access or is it Protected by allowing only outgoing access to internet.

  • Network privacy can be achieved via VPCs and subnets if you are hosted on cloud or through VLAN and DMZs if you are on premise and on legacy systems. You should have VPCs over classic or dynamic network.

  • Configurations must be logically segregated or tiered with respect to usage (e.g. per product or customer).

  • Firewall rules must be adapted per tier/subnet.

  • If necessary segregate virtual machines and appliances to dedicated hardware.

  • Always keep separate networks for production and non-production.

PreviousNetworkNextPerimeter Security

Last updated 2 years ago

Was this helpful?

1️⃣