July 14, 2021

Securing Web Content vs Data

Hey Guys, need to pick your thoughts on an architecture as listed. Why do Reverse Proxies need to be in its own DMZ which then proxies the HTTP requests from the Semi Trusted DMZ into the trusted DMZ? This is the path:

Browser -> WAF -> NGFW (Enter Semi-trusted DMZ) -> RProxy -> NGFW (End of Semi-Trusted DMZ and Start of Trusted DMZ) -> Load Balancer -> App -> Database

We are talking about industry leading solution as WAF and NGFW in the path of the HTTP request entering the Semi trusted DMZ.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.