2️⃣Uniformly secure access to your infrastructure

Following the principle of least privilege you should prevent unintended access to your infrastructure. To reduce the risk of inadvertent access, you should define the network boundaries of your system. In this course you'll learn how to uniformly secure access to your entire cluster according to the following traffic pattern table:
Traffic Pattern
Allowed Before
Allowed After
Internet -> ALB on port 80
ALB -> APP1 on ports 8000
or 8001
ALB -> APP2 on ports 9000
or 9001
Internet -> ALB on any port
Internet -> APP1 on any port
Internet -> APP2 on any port
What you'll need
Tutorial
Step 1: Create Security PolicyStep 2: Install FirewallStep 3: Apply Security PoliciesLast updated