2️⃣Uniformly secure access to your infrastructure

Following the principle of least privilege you should prevent unintended access to your infrastructure. To reduce the risk of inadvertent access, you should define the network boundaries of your system. In this course you'll learn how to uniformly secure access to your entire cluster according to the following traffic pattern table:

Traffic Pattern
Allowed Before
Allowed After

Internet -> ALB on port 80

ALB -> APP1 on ports 8000 or 8001

ALB -> APP2 on ports 9000 or 9001

Internet -> ALB on any port

Internet -> APP1 on any port

Internet -> APP2 on any port

What you'll need

Tutorial

Step 1: Create Security PolicyStep 2: Install FirewallStep 3: Apply Security Policies

Last updated