• +65 6652 3398
  • info@wgrow.com
  • 114 Lavender St, #07-51 CT Hub 2

wGrow - Team Notes

Sharing Expertise: Tech Insights and Case Studies

Cloud Server Security Architecture for Medical Service Group

Overview

This document provides a detailed overview of the security architecture we implemented for a medical service group on Amazon Web Services (AWS) and Microsoft Azure. It covers various facets of cloud server security - from initial setup to continuous monitoring and improvements, showcasing our comprehensive expertise in ensuring robust and secure cloud infrastructure.

Note: Information shared here are not confidential.

Private Virtual Private Network (VPN) Setup

We configured a private VPN using OpenVPN, a renowned open-source VPN software, allowing secure and remote access to the cloud servers. This VPN provides an encrypted tunnel, securing all the data in transit from potential eavesdropping.

Private Server and Public Server Local Area Network (LAN) Setup

We segregated the servers into two types: private and public, based on the nature of the data they handled and their exposure to the internet. We used AWS VPC (Virtual Private Cloud) and Azure VNet (Virtual Network) to establish these LANs.

Firewall Configuration

We set up network firewalls using AWS Security Groups and Azure Network Security Groups, controlling inbound and outbound traffic based on predetermined security rules. Furthermore, we installed host-based firewall solutions, like iptables, on each server for an additional layer of security.

Server and Network Traffic Hardening

All servers were hardened following industry best practices, including the least privilege principle, disabling unused services, securing SSH access, etc. For network traffic hardening, we utilized AWS Shield and Azure DDoS Protection Standard, offering seamless DDoS protection and mitigation.

Penetration Testing and Vulnerability Assessment (VA)

Regular penetration tests were performed using tools like Metasploit and Nessus, identifying potential vulnerabilities in the infrastructure. Upon discovery, the issues were fixed promptly.

Anti-Virus Software Installation

We installed server-grade anti-virus software on all servers. In AWS, we used AWS Managed Antivirus based on Trend Micro's technology. For Azure, we used Azure Security Center's Antimalware solution.

Whitelist IP Setup for Server and Web Service Communications

We utilized AWS Security Groups and Azure Network Security Groups to establish a whitelist of IP addresses. This method ensures only trusted entities can communicate with our servers and web services.

Access Log Server Configuration

To permanently store all access logs, we set up a separate server with Elasticsearch, Logstash, and Kibana (ELK stack). This setup not only stores logs but also enables advanced data visualization and analysis.

Backup Server and AWS Image Snapshot Setup

We configured a separate backup server to store application and database backups. The backup process leveraged Secure File Transfer Protocol (SFTP) for data transfer, ensuring secure and reliable backups. AWS's built-in EC2 Image Snapshot feature was used for daily image backups, providing another layer of data protection.

Secondary Cloud Infrastructure in Azure

To ensure high availability and disaster recovery, we mirrored the entire infrastructure setup on Microsoft Azure. The data synchronization was done using a secure FTP connection, safeguarding the data in transit.

Handshake Protocol Configuration

We implemented custom handshake protocols using AWS Lambda and Azure Functions, checking server health and database status. These protocols are capable of detecting potential attacks within 10 seconds, providing us with rapid incident response capability.

Conclusion

The successful implementation of this comprehensive cloud server security architecture showcases our profound expertise and ability to create robust, secure, and highly available infrastructures. We stand ready to leverage our skills to address your unique security needs and challenges, ensuring your cloud journey is safe, efficient, and fruitful.

Related

Creating a Desktop Application to Backup Gmail Emails and Restore to Gmail or Yahoo Email using C#

Creating a Desktop Application to Backup Gmail Emails and Restore to Gmail or Yahoo Email using C#

Backing up important emails from your Gmail account is essential to ensure data security and availab...

Read More >
Case Study: Virtualizing a Legacy Windows Server 2000 Application for Improved Security and Maintainability

Case Study: Virtualizing a Legacy Windows Server 2000 Application for Improved Security and Maintainability

In this case study, we describe the process of virtualizing a legacy Windows Server 2000 application...

Read More >
SQL Server Hardening Checklist & Best Practices

SQL Server Hardening Checklist & Best Practices

It's essential to ensure that SQL Server is secure and protected against potential cyber threats...

Read More >
Leveraging Excel VBA and Forms for Rapid Development of a Time-Sensitive Sales Order Management System

Leveraging Excel VBA and Forms for Rapid Development of a Time-Sensitive Sales Order Management System

In the world of enterprise software development, it is crucial to balance the need for rapid deploym...

Read More >
Unlocking Possible Supports: A Guide to Grants for Singapore SMEs

Unlocking Possible Supports: A Guide to Grants for Singapore SMEs

If you are a small or medium enterprise (SME) in Singapore, you may be looking for ways to grow your...

Read More >
Condo Management System

Condo Management System

Introducing our comprehensive Condo Sales and Management system, designed to streamline and simplify...

Read More >
Contact Us
  • Our Address:
    114 Lavender Street, #07-51, CT Hub 2, Singapore 338729
    Malaysia Johor - 99-01 Jalan Adda 3/1 Taman Adda Height 81100 Johor Bahru Johor, Malaysia
  • Phone Number:
    +65 6652 3398
  • WhatsApp:
    WhatsApp Us
  • Email:
    info@wgrow.com