• caglararli@hotmail.com
  • 05386281520

Ideal system architecture for sensitive data access through DMZ

Çağlar Arlı      -    33 Views

Ideal system architecture for sensitive data access through DMZ

I'm trying to figure out the best approach for handling external requests. I am working on a system where the application is currently sitting outside (DMZ) and the DB is inside. The specific port required for DB access has been opened from DMZ machine to DB machine.

After discussing with my team, we have agreed that DMZ shouldn't be connecting to the DB directly. After further discussion, we have shortlisted the following two approaches as possible solutions.

To me, both seem to be the same as far as security is concerned since we have the same communication protocols being used and the same number of layers.

Is my understanding correct? If so, would B be the more logical option? A would mean that we have a custom data access service which handles requests from the APP and reads/writes data.

Finally, if we do go with B, would it be recommended that we still use the Data Access Service but it would be internal (i.e. APP -> Data Access Service -> DB)

Two alternative approaches for handling requests from the internet