Application Security in a cloud environment such as Amazon EC2

By: Emilley J Emailed: 1600 times Printed: 2046 times    

Latest comments
By: rohit kumar - how this program is work
By: Kirti - Hi..thx for the hadoop in
By: Spijker - I have altered the code a
By: ali mohammed - why we use the java in ne
By: ali mohammed - why we use the java in ne
By: mizhelle - when I exported the data
By: raul - no output as well, i'm ge
By: Rajesh - thanx very much...
By: Suindu De - Suppose we are executing

In addition to the inbuilt security of any IAAS architecture such as Amazon EC2, the application itself should enforce security between its webservers, application servers and database servers. This is achieved by the use of Security Groups and grouping the servers in their own security groups. This is explained in the diagram below.

The three tier architecture is replicated in Amazon EC2 by the use of Security Groups . Three different security groups should be created in the Amazon EC2.

  1. Webservers group

In this group the websites together with any UI servers will be hosted. Any other server that is open to the public should be added to this group. This group is equivalent to the DMZ zone in a traditional network architecture. Port 80 will be opened in this group.

  1. Appservers group

The Appserver’s group will consists of all the Appservers in your application such as SSO server, Monitoring Server, etc. This group is protected with specific ports and only accessible from the webserver group of instances.

  1. DB Servers group

This group hosts the hot and standby Database Servers and only the port 3306 or 1433 based on which database you use, is open to be accessed from the Appserver group.

The IT Admin staff will be able to remotely manage the servers via SSH or RDP based on your platform.


Cloud Home | All Cloud Tutorials | Latest Cloud Tutorials

Sponsored Links

If this tutorial doesn't answer your question, or you have a specific question, just ask an expert here. Post your question to get a direct answer.



Bookmark and Share

Comments(0)


Be the first one to add a comment

Your name (required):


Your email(required, will not be shown to the public):


Your sites URL (optional):


Your comments:



More Tutorials by Emilley J
Application Security in a cloud environment such as Amazon EC2

More Tutorials in Cloud
Mac with Google Apps
HA and DR in a cloud environment such as Amazon EC2
Backup and recovery in a cloud environment such as Amazon EC2
Application Security in a cloud environment such as Amazon EC2
Security and Privacy Management in the Cloud
Upgrade micro instance to small instance in Amazon ec2

More Latest News
Most Viewed Articles (in Cloud )
Upgrade micro instance to small instance in Amazon ec2
Backup and recovery in a cloud environment such as Amazon EC2
Application Security in a cloud environment such as Amazon EC2
Mac with Google Apps
HA and DR in a cloud environment such as Amazon EC2
Security and Privacy Management in the Cloud
Most Emailed Articles (in Cloud)
Mac with Google Apps
Upgrade micro instance to small instance in Amazon ec2
Backup and recovery in a cloud environment such as Amazon EC2
Application Security in a cloud environment such as Amazon EC2
Security and Privacy Management in the Cloud
HA and DR in a cloud environment such as Amazon EC2