[Cloud Computing]Mechanisms: Automatically Defined Perimeter Controller
来源:互联网 发布:网络电视手机在线直播 编辑:程序博客网 时间:2024/06/14 19:38
Automatically Defined Perimeter Controller
The automatically defined perimeter (ADP) controller uses secure channels to control ADP participating hosts. ADP hosts can either initiate connections or accept connections managed by interactions with the ADP controller. This architecture that separates the control plane from the data plane enables greater security and scalability. All endpoints attempting to access a given infrastructure must be authenticated and authorized prior to entrance.
The ADP relies on authentication and access control mechanisms. It mitigates many network-based attacks, such as scanning, DDoS and injection attacks, and OS and application vulnerability exploits, as well as man-in-the-middle (MITM), cross-site scripting (XSS), cross-site request forgery (CSRF), pass-the-hash (PTH) and other attacks.
Figure 1 - An example of an automatically defined perimeter controller.
Figure 1 shows an ADP controller directing the access of a cloud consumer to two cloud provider services. Upon request from the consumer, the ADP authenticates the cloud consumer and delivers the service endpoints to the consumer. It also notifies the relevant services to provide access privileges to the authenticated consumer for a specified period of time.
The ADP architecture uses additional security controls, including single packet authorization, rejection of unauthorized traffic, mutually authenticated endpoint transport layer security, device validation that proves it is running trusted software, dynamic firewalls that deny until the ADP sends a permit rule, and application binding that restricts application communication to encrypted tunnels.
Related Patterns:
- Automatically Defined Perimeter
- [Cloud Computing]Mechanisms: Automatically Defined Perimeter Controller
- [Cloud Computing]Mechanisms: Logical Network Perimeter
- [Cloud Computing]Mechanisms: Application Delivery Controller
- [Cloud Computing]Mechanisms: Certificate
- [Cloud Computing]Mechanisms: Encryption
- [Cloud Computing]Mechanisms: Geotag
- [Cloud Computing]Mechanisms: Honeypot
- [Cloud Computing]Mechanisms: Hypervisor
- [Cloud Computing]Mechanisms: Sandbox
- [Cloud Computing]Mechanisms: Attestation Service
- [Cloud Computing]Mechanisms: Attribute Authority
- [Cloud Computing]Mechanisms: Audit Monitor
- [Cloud Computing]Mechanisms: Certificate Authority
- [Cloud Computing]Mechanisms: Data Transport
- [Cloud Computing]Mechanisms: Digital Signature
- [Cloud Computing]Mechanisms: Failover System
- [Cloud Computing]Mechanisms: Load Balancer
- [Cloud Computing]Mechanisms: LUN Masking
- 《剑指offer》-两个链表的第一个公共结点
- 15.2 asyncio--异步I/O事件库
- 欢迎使用CSDN-markdown编辑器
- 字节流读取数据注意事项
- 程序员常用工具大全(转载+原创)
- [Cloud Computing]Mechanisms: Automatically Defined Perimeter Controller
- 微信 支付异步回调 获取参数值
- 使用Eclipse里的Tomcat经常内存溢出的解决方法
- 匈牙利算法模板
- 【iReport+JasperReport】3.在Java工程中用jasper导出Excel报表
- JVM内存不足增大运行时内存
- 接口回调是个啥?
- shiro入门实例
- weChat 支付 (转载)