SecureAccess® CLOUD protects web applications from external threats and prevent unauthorized access using these additional security recommendations at firewall or server level.
To prevent unauthorized access from the Internet to your web applications we recommend you configure your server to accept only request from SecureAccess® CLOUD servers. This can be done at Firewall level or configuring the server itself. If you choose the second option, this are to examples you can use for the Linux and Windows servers.
In Linux servers you can add iptables rules to block incoming traffic from other IP addresses than SecureAccess® CLOUD:
To obtain the list of SecureAccess® CLOUD servers IP addresses contact our support team using the support form in your admin dashboard of sending an email to [email protected].
If you fail to implement these measures in your servers IP address is leaked your web applications will be exposed to external threats.