Uniformly secure access to your infrastructure
Last updated
Last updated
Following you should prevent unintended access to your infrastructure. To reduce the risk of inadvertent access, you should define the network boundaries of your system. In this course you'll learn how to uniformly secure access to your entire cluster according to the following traffic pattern table:
Internet -> ALB on port 80
ALB -> APP1 on ports 8000
or 8001
ALB -> APP2 on ports 9000
or 9001
Internet -> ALB on any port
Internet -> APP1 on any port
Internet -> APP2 on any port
Complete the .