Use allowlisted instead of whitelisted.

Use blocklist instead of blacklist.
pull/843/head
JSon 2024-02-26 13:16:36 +08:00
parent a07e261677
commit 07733f76c2
2 changed files with 3 additions and 3 deletions

View File

@ -740,7 +740,7 @@ A reverse proxy is a web server that centralizes internal services and provides
Additional benefits include:
* **Increased security** - Hide information about backend servers, blacklist IPs, limit number of connections per client
* **Increased security** - Hide information about backend servers, blocklist IPs, limit number of connections per client
* **Increased scalability and flexibility** - Clients only see the reverse proxy's IP, allowing you to scale servers or change their configuration
* **SSL termination** - Decrypt incoming requests and encrypt server responses so backend servers do not have to perform these potentially expensive operations
* Removes the need to install [X.509 certificates](https://en.wikipedia.org/wiki/X.509) on each server

View File

@ -126,7 +126,7 @@ Add a **DNS** such as Route 53 to map the domain to the instance's public IP.
* Allow the web server to respond to incoming requests from:
* 80 for HTTP
* 443 for HTTPS
* 22 for SSH to only whitelisted IPs
* 22 for SSH to only allowlisted IPs
* Prevent the web server from initiating outbound connections
*Trade-offs, alternatives, and additional details:*
@ -182,7 +182,7 @@ We've been able to address these issues with **Vertical Scaling** so far. Unfor
* Use a Virtual Private Cloud
* Create a public subnet for the single **Web Server** so it can send and receive traffic from the internet
* Create a private subnet for everything else, preventing outside access
* Only open ports from whitelisted IPs for each component
* Only open ports from allowlisted IPs for each component
* These same patterns should be implemented for new components in the remainder of the exercise
*Trade-offs, alternatives, and additional details:*