Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
AWS Cloud Computing Concepts and Tech Analogies

You're reading from  AWS Cloud Computing Concepts and Tech Analogies

Product type Book
Published in Apr 2023
Publisher Packt
ISBN-13 9781804611425
Pages 358 pages
Edition 1st Edition
Languages
Authors (3):
Ashish Prajapati Ashish Prajapati
Profile icon Ashish Prajapati
Juan Carlos Ruiz Juan Carlos Ruiz
Profile icon Juan Carlos Ruiz
Marco Tamassia Marco Tamassia
Profile icon Marco Tamassia
View More author details
Toc

Table of Contents (22) Chapters close

Preface 1. Part 1: Cloud Infrastructure and Core Services
2. Chapter 1: Understanding Cloud Computing – Demystifying the Cloud 3. Chapter 2: Global Infrastructure behind Cloud Platforms – What Is the Cloud Made of? 4. Chapter 3: Computing – In Cloud We Trust, Everything Else We Compute 5. Chapter 4: Storage – Where Should I Keep My Data and Maybe Publish It? 6. Chapter 5: Networking – So, How Do I Get Inside, Outside, and Across the Cloud? 7. Part 2: Platform Services
8. Chapter 6: Databases – To SQL or Not to SQL for So Many Records… 9. Chapter 7: Identity and Access Management – Who Am I and What Can I Do? 10. Chapter 8: Monitoring – Is Big Brother Watching? 11. Chapter 9: Scalability – I Scale to the Moon and Back 12. Part 3: Application Services
13. Chapter 10: Automation – Look, My Infrastructure Is in Code! 14. Chapter 11: Decoupled Architectures – in Space and Time 15. Chapter 12: Containers – Contain Yourself and Ship Some Containers 16. Chapter 13: Serverless – So, Where Are My Servers? 17. Chapter 14: Caching – Microseconds Latency: Why Are We Always in a Rush? 18. Chapter 15: Blockchain – Who Watches the Watchmen? 19. Chapter 16: What the Future Holds 20. Index 21. Other Books You May Enjoy

Filtering traffic with security rules (stateful and stateless)

After the lunch break, the team continues to discuss the security needs it found. It seems the VPC is isolated using the internet gateway and routing tables, but that may not be secure enough for some scenarios.

Alex: I’m thinking about one scenario. What happens if you create a public subnet with several servers – you know, adding an internet gateway and changing the routing table to point to it? Then, will all the hackers on the internet be able to connect to these servers?

Raj: I was also thinking about a related scenario. If one team has an application running inside the VPC, it will be able to access all the servers inside that VPC. If they make a mistake, nobody will stop them. Maybe the test environment could delete all the production databases if someone copies the wrong parameters, as a connection string…

Alex...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime