Today, let we discuss how we can secure our Network? By just implementing some practices, we can secure our network from outside world.
Best security practices permeate all aspect of system design, implementation as well as deployment. All applications must be secure with interfaces that present only relevant data to those users who are authorized. You must take care to avoid coding practices during implementation that could result in vulnerability to techniques like SQL injection or buffer overflow. During deployment operating systems should be hardened and each layer of software should be up to date with the latest security patches.
In cloud computing, applications are deployed in a shared network environment and to protect and segment many layers of application deployment architecture and isolating customers from each other, some straightforward security techniques like port filtering and VLANs are used. Some good approaches to network security are:
• To group all virtual machines together, and then to control access to the domain through the cloud provider’s port filtering capabilities, you can use security domains. For example: create a security domain for front-end Web servers, open only the HTTP/HTTPS ports to the outside world, and filter traffic from the Web server security domain to the one that containing back-end databases.
• Use cloud provider’s port-based filtering to control traffic or you can utilize more packet filtering where appropriate by interposing firewall appliances or content switches. Immutable Service Containers (ISCs) concept allow various multiple layers of software to be deployed in a single virtual machine for more fine-grained control over traffic, with pre-plumbed networking that is kept internal to the virtual machine. This technology uses Solaris Zones to support various secure multiple virtual environments on a shared OS platform and it is available with both the OpenSolaris and Solaris Operating Systems.
I hope now you can easily secure your network from external world.