This article will discuss Defense in Depth (DID) in detail and minimum steps to securely deploy a Web server in DMZ for a FinTech 3-tier application.
In software engineering the methodology of 3-tier architecture is used to divide an application into logical boundaries. These boundaries are logical and their main benefit is that each layer OS, App, Virtual Machine and Hardware can be upgraded, downgraded, and replaced without disturbing other layers.
The three layers of this architecture are:
- PRESENTATION LAYER: This tier is the main public facing layer, where users . . .