🚀
Ten Factor Infrastructure
HomeGet StartedFeatures & Plan
  • 👋Overview
  • The Ten Factors
    • 1️⃣Network
      • Segregated Network
      • Perimeter Security
      • Single Secure Entrypoint
      • Dedicated Peer-to-peer Connection
    • 2️⃣System
    • 3️⃣Storage
    • 4️⃣Identity Management
    • 5️⃣Logging
    • 6️⃣Monitoring
    • 7️⃣Security
    • 8️⃣Availability
    • 9️⃣Disaster Recovery
    • 🔟Environment On Demand
Powered by GitBook
On this page

Was this helpful?

  1. The Ten Factors
  2. Network

Single Secure Entrypoint

  • Make sure the device where requests land first is secure. It must be a single trusted Point endpoint exposed with IP Segregation, DNS based backend mapping, WAF features that implements OWASP policies, DDoS Protection.

  • You can use services like Cloudflare, Akamai. These also come with CDN that helps keeping your app endpoint flexible to point to wherever you backend it, helps in static asset migrations.

  • Configure certificate management for SSL certificate generation, renewal and offloading.

  • Mutual TLS to establish zero trust policy with any third party application endpoint.

PreviousPerimeter SecurityNextDedicated Peer-to-peer Connection

Last updated 2 years ago

Was this helpful?

1️⃣