By: Emilley J in Cloud Tutorials on 2012年10月20日 [フレーム]
In addition to the inbuilt security of any IAAS architecture such as Amazon EC2, the application itself should enforce security between its webservers, application servers and database servers. This is achieved by the use of Security Groups and grouping the servers in their own security groups. This is explained in the diagram below.
The three tier architecture is replicated in Amazon EC2 by the use of Security Groups . Three different security groups should be created in the Amazon EC2.
In this group the websites together with any UI servers will be hosted. Any other server that is open to the public should be added to this group. This group is equivalent to the DMZ zone in a traditional network architecture. Port 80 will be opened in this group.
The Appserver's group will consists of all the Appservers in your application such as SSO server, Monitoring Server, etc. This group is protected with specific ports and only accessible from the webserver group of instances.
This group hosts the hot and standby Database Servers and only the port 3306 or 1433 based on which database you use, is open to be accessed from the Appserver group.
The IT Admin staff will be able to remotely manage the servers via SSH or RDP based on your platform.
This policy contains information about your privacy. By posting, you are declaring that you understand this policy:
This policy is subject to change at any time and without notice.
These terms and conditions contain rules about posting comments. By submitting a comment, you are declaring that you agree with these rules:
Failure to comply with these rules may result in being banned from submitting further comments.
These terms and conditions are subject to change at any time and without notice.
Most Viewed Articles (in Cloud )
Power On a VM from ESXI command line
HA and DR in a cloud environment such as Amazon EC2
Application Security in a cloud environment such as Amazon EC2
How to get the API key for CloudStack
Security and Privacy Management in the Cloud
Backup and recovery in a cloud environment such as Amazon EC2
How to change the virtual machine name in Azure
Latest Articles (in Cloud)
Power On a VM from ESXI command line
How to change the virtual machine name in Azure
Install OpenStack step by step guide
How to get the API key for CloudStack
HA and DR in a cloud environment such as Amazon EC2
Backup and recovery in a cloud environment such as Amazon EC2
Application Security in a cloud environment such as Amazon EC2
Power On a VM from ESXI command line
How to change the virtual machine name in Azure
Install OpenStack step by step guide
How to get the API key for CloudStack
HA and DR in a cloud environment such as Amazon EC2
Backup and recovery in a cloud environment such as Amazon EC2
Application Security in a cloud environment such as Amazon EC2
© 2023 Java-samples.com
Tutorial Archive: Data Science React Native Android AJAX ASP.net C C++ C# Cocoa Cloud Computing EJB Errors Java Certification Interview iPhone Javascript JSF JSP Java Beans J2ME JDBC Linux Mac OS X MySQL Perl PHP Python Ruby SAP VB.net EJB Struts Trends WebServices XML Office 365 Hibernate
Latest Tutorials on: Data Science React Native Android AJAX ASP.net C Cocoa C++ C# EJB Errors Java Certification Interview iPhone Javascript JSF JSP Java Beans J2ME JDBC Linux Mac OS X MySQL Perl PHP Python Ruby SAP VB.net EJB Struts Cloud Computing WebServices XML Office 365 Hibernate