Edge layer
We touched on the importance of leveraging the edge of the cloud in the API Gateway pattern, in Chapter 4, Boundary Patterns. Cloud providers have vast and expansive edge capabilities spread around the globe. These edge capabilities obviously have enormous performance benefits, but their security benefits are on par or more so. It is recommended to route all traffic, PUT, POST, DELETE, GET, and so forth, through the CDN, to minimize the attack surface of a cloud-native system. By walling off all other avenues to the system, all traffic must pass through the CDN, which provides managed network level DDOS attack protection. Cloud providers have advanced DDOS offerings, but simply leveraging the CDN provides significant default protection. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access