Security without Obscurity: A Guide to Cryptographic Architectures by Jeff Stapleton
Author:Jeff Stapleton [Stapleton, Jeff]
Language: eng
Format: epub, pdf
Publisher: CRC Press
Published: 2018-07-10T23:00:00+00:00
Figure 6.9 Application architecture with crypto.
Figure 6.10 Network architecture for application VLAN.
Figure 6.9 shows a network architecture for the application VLAN with cryptography information. The application VLAN in the DMZ restricts access to the Web and BP servers, and another application VLAN in the network limits access to the App and DB servers. As discussed for the DMZ application VLAN:
The Web servers have TLS keys, a private asymmetric key and a public key certificate, for the external HTTPS connection to web browsers.
The App servers have TLS keys, a private asymmetric key and a public key certificate, for the internal TLS connections to the Web servers and the BP servers.
As observed for the network application VLAN:
The App servers have TLS keys, a private asymmetric key and a public key certificate, for the internal TLS connections to the Web servers and the BP servers.
The Web servers and the BP servers reuse their same certificates for both their external and internal TLS connections.
Modifying network diagrams with cryptography information likewise is helpful to understand the cryptographic architecture. The network devices (who) are identified, the key types (what) and purposes (why) are implied by the protocols (HTTP, TLS), the locations (where) are indicated, and the protocols (when) are provided. However, Figure 6.9 does not document all of the connections; for a more complete viewpoint, Figure 6.10 needs to be considered.
Figure 6.10 shows a network architecture for the administrative VLAN with cryptography information. The admin VLAN in the DMZ limits access to the RAS and a separate VLAN in the network restricts access to the SS and AS. From a network perspective,
Outside the DMZ the Internet routers have IPsec keys, a private asymmetric key and a public key certificate, for cross-connecting the East and West datacenters.
Inside the DMZ the RAS has TLS keys, a private asymmetric key and a public key certificate, for VPN access.
Inside the network the routers have IPsec keys, a private asymmetric key and a public key certificate, for synchronizing the DB servers.
Inside the network the AS has TLS keys, a private asymmetric key and a public key certificate, for connecting to the RAS inside the DMZ.
Inside the network the AS has SSH keys, a private asymmetric key and a public key certificate, for administrating other servers and network devices.
As mentioned, updating network diagrams with cryptography information is helpful to understand the cryptographic architecture. The network devices (who) are identified, the key types (what) and purposes (why) are implied by the protocols (HTTP, TLS), the locations (where) are indicated, and the protocols (when) are provided. However, Figures 6.10 and 6.11 together still do not address all of the cryptography information. Another viewpoint is adding cryptography information to the data diagram as shown in Figure 6.12.
The web servers have a TLS certificate chain and its TLS private key for external connections, along with an SSH public key for internal administration.
The BP servers have a TLS certificate chain and its TLS private key for external connections, along with an SSH public key for internal administration.
The
Download
Security without Obscurity: A Guide to Cryptographic Architectures by Jeff Stapleton.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Brazilian Economy since the Great Financial Crisis of 20072008 by Philip Arestis Carolina Troncoso Baltar & Daniela Magalhães Prates(133690)
International Integration of the Brazilian Economy by Elias C. Grivoyannis(107614)
The Art of Coaching by Elena Aguilar(53164)
Flexible Working by Dale Gemma;(23282)
How to Stop Living Paycheck to Paycheck by Avery Breyer(19684)
The Acquirer's Multiple: How the Billionaire Contrarians of Deep Value Beat the Market by Tobias Carlisle(12305)
Thinking, Fast and Slow by Kahneman Daniel(12217)
The Radium Girls by Kate Moore(12011)
The Art of Thinking Clearly by Rolf Dobelli(10407)
Hit Refresh by Satya Nadella(9115)
The Compound Effect by Darren Hardy(8918)
Tools of Titans by Timothy Ferriss(8359)
Atomic Habits: Tiny Changes, Remarkable Results by James Clear(8315)
Turbulence by E. J. Noyes(8014)
A Court of Wings and Ruin by Sarah J. Maas(7805)
Change Your Questions, Change Your Life by Marilee Adams(7732)
Nudge - Improving Decisions about Health, Wealth, and Happiness by Thaler Sunstein(7689)
How to Be a Bawse: A Guide to Conquering Life by Lilly Singh(7464)
Win Bigly by Scott Adams(7181)