Security Security Architecture On this page
I. Network Security Architecture
Multi-tier application architecture (i.e., DMZ, FE, BE) topology has been established.
Strict access controls to restrict remote administractive access to selected network segments and from selected devices only (i.e., jump host device).
Seperate environments for development, testing, staging and production.
Intenet-facing systems are protected against DDoS attacks using appropriate anti-DDoS solutions.
Deploy firewall or access control across boundaries, tiers.
II. Application Security Architecture
To identify potential security flaws at an early stage and mitigate them before starting the development stage.
Poor design of architecture may expose the application to many security loopholes.
Reduce the attack surface
AVA (Application Vulnerability Assessment)
Penetration Testing
Verify that incoming access is allowed only from a set of known trusted IP addresses
Outdated and unsupported hardware and software should not be used
Verify that the functionalities that are not in-use have been disabled and that unnecessary code removed
Log the user logins, access control failures, and server-side input validation failures are logged to identify suspicious or malicious accounts
Apply Principle of Least Privilege
Data access permission are granted with right level of data access in tandem with changes on job roles and data secutrity classification
Access permisions are reviewed regularly
Any user access is duly approved and monitored
User who is no longer entitled to an application should be revoked
III. Data Security Architecture
Confidential or highly sensitive data in transit & at rest are encrypted using encryption protocols (i.e., TLS 1.2)
Access to confidential or highly sensitive data stored are protected by strong authentication mechanisms and access right is follow the priniciple of 'Need to know'
Privileged IDs are enabled with 2FA
All IDs using for application are managed and lodged in EPV
Cryptographic keys lifecycle are tracked and managed as per review cycle
Production data is masked
IV. Security Configuration
Security Threats: Malware, APT attacks, data leak, and corruption
1. Authentication
Integrate with LDAP/AD
Enforce MFA
Strong password policy (i.e., min. 12 characters)
Session timeout (i.e., auto timeout 15-30 mins)
Restrict user concurrent sessions
Disable default admin accounts
2. Authorization
RBAC
Least privilege
Segregation of duties (SoD)
Role change audits
3. Transport Security
Enable TLS 1.2
Use of secure protocols (disable HTTP, FTP, and unused ports)
API Security: tokens, IP whitelisting
Network segmentation: Isolate FE, BC, DB.
4. Data Protection
DB encryption: SHA2
File encryption: AES-256
Data masking
Back security: encrypt & restrict access of disk
Data retention policy
5. Logging
Log users activities
Log admin activities, i.e., system change
Log retention
Central logging
6. Environment Hardening
Run service as non-root users
Only use DB users to access to DB
7. Integration Security
Secure interfaces, TLS
Whitelisting/Firewall, restrict IPs for inbound and outbound interfaces
Input validation, data sanitize
Certificate Management, i.e. use trusted CAs, rotate SSL certs periodically