I would not recommend using any form of public key to communicate with your web server on your application server. If you control both systems like a regular secret encryption system. You know the identity of your application server, so maintaining key security is not a problem. If you ever need to change or update your private key, just do it manually to prevent leakage through the connection.
What I would be very careful about is the direction of transferring data from your server to the DMZ, which should only be your web server, into those boxes that are inside your network. For legitimate domains, it is becoming more common to distribute malware to visitors. This is bad, but if the malware should have turned into a chamber on your network, and not just for your users, then your business will be completely closed.
I also did not see anything about preventing the implementation of sql or system hardening / patching to prevent the spread of malware. This should be your first and most important consideration. If security is important to you, then your architecture will be flexible for small server-to-server communications and frequent patches. Most websites, even large legitimate companies, never fix their security holes, even if they are compromised. You must constantly fix security holes and change things to prevent holes from occurring if you want to avoid compromising in the first place.
In order not to become a malware distributor, I propose to make strict and fast rules for using media files containing any types of client scripts. Client-side scripting can be found in JavaScript, ActiveX, Flash, Acrobat, Silverlight, and other codes or plug-ins that run on the client system. Policies for serving this content must exist in order to immediately identify abnormal code fragments. My recommendation is NEVER embed client-side code directly in the browser, but always refers to an external file. I also suggest that multimedia tools like-minded people provide you better control over your assets and save bandwidth, for example, one large JavaScript file instead of 8 small ones. I would also recommend forcing all such media to use an external content distribution system that references your domain in its directory structure. Thus, the media is not served directly from your servers, and if they are used directly from you, you can quickly identify it as potentially malicious and require a security check.
austin cheney
source share