Humankind has not woven the web of life. We are but one thread within it. Whatever we do to the web, we do to ourselves. All things are bound together. All things connect.

Chief Seattle

Chapter 3
Start Connecting

In the last chapter you learned how to secure the first layer of defense—the environment. With that out of the way, we can now focus on the next two layers of defense—networking and application support—shown in the following illustration.

It doesn’t matter how carefully you avoid security errors inside your application if you aren’t careful about how the application communicates with users and other network components. In this chapter you’ll learn how to set up network defenses, track what’s happening, and make sure the server doesn’t kick the bucket for any old request.

First, we’ll see how to set up traffic encryption with Node.js to prevent eavesdropping. We’ll then set up a support system for the application to provide diagnostics and robustness for its operational life.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.127.68