On-Premise vs Cloud Installation
Introduction
This article explores Lucy's adaptable architecture for on-premise and cloud-hosted setups.
Cloud Installation Advantages:
Reduced Attack Surface: Placing LUCY on the internet eliminates the need to modify internal firewall settings, aligning with secure zone principles and minimizing attack vectors.
Simplified Integration: Cloud-based LUCY servers are quicker to set up, facing fewer integration challenges with existing email, DNS, and firewall configurations.
Direct Access: Hosting servers in the cloud bypasses internal security obstacles, ensuring uninterrupted access.
Public IP Address: A cloud server provides a public IP address outside your network range, reducing the risk of having your infrastructure blacklisted.
On-Premise Installation Advantages:
Enhanced Security: Hosting LUCY internally utilizes the existing security infrastructure (IDS, firewalls, etc.) to protect sensitive data (login credentials, usernames, emails) from unauthorized access.
Integration with Backend Systems: LUCY seamlessly integrates with various APIs (LDAP, REST, etc.) that are secured within the internal network and not exposed to the internet.
Compliance with Legal Requirements: Regulations like GDPR in Europe may restrict storing sensitive data on external servers, making on-premise installations necessary.
Placement in an On-Premise Installation:
For on-premise setups, LUCY can be deployed within the intranet or a secured zone (DMZ). However, granting secure access for external users (e.g., mobile devices accessing phishing simulations or e-learning modules) directly from the intranet poses security risks. A web server exposed to the internet could serve as an entry point for attackers if vulnerabilities are exploited.
Recommended Configuration for On-Premise Deployment:
Reverse Proxy Setup: Use a LUCY instance as a reverse proxy in the DMZ, with the main application hosted securely within the intranet as the "master instance". This setup provides an extra layer of security by managing external access while keeping the core application protected inside the internal network.
DMZ Installation: For better security, install LUCY in a separate, secure zone within the DMZ. This configuration reduces direct exposure to the intranet.
See our platform reference article on Master/Slave deployment
Last updated