Articles in this section
Category / Section

Protection implemented by Bold Reports to prevent DDoS attacks

Published:
Updated:

Distributed Denial of Service (DDoS) attacks can be a significant threat to any internet-accessible service. Bold Reports takes several measures to ensure the protection of its services from such attacks. This article outlines the various layers of protection implemented by Bold Reports to prevent DDoS attacks.

In Application Layer

Input Validation

Bold Reports ensures that all user inputs are validated and sanitized to prevent malicious traffic from entering the system. This helps mitigate the risk of DDoS attacks at the application level.

Caching

Bold Reports uses caching techniques to reduce the load on the server and respond to repeated requests quickly. This helps in minimizing the impact of excessive traffic on the system.

In Network/Environment Layer

Bold Reports secures its AWS ECS infrastructure using the following concepts:

  1. Application Load Balancer: This helps in distributing incoming traffic across multiple targets, ensuring that no single target is overwhelmed by excessive traffic.
  2. Auto Scaling: This feature allows the system to automatically adjust its capacity to maintain steady and predictable performance at the lowest possible cost.
  3. Application Firewall and Custom VPC: Bold Reports uses an application firewall and custom Virtual Private Cloud (VPC) to provide an additional layer of security to the infrastructure.
  4. SSL: Secure Socket Layer (SSL) encryption is used to protect data transmitted between the client and the server, ensuring that any intercepted data remains unreadable.

Additional References

Was this article useful?
Like
Dislike
Help us improve this page
Please provide feedback or comments
Comments (0)
Please  to leave a comment
Access denied
Access denied