Given a setup where we have nginx sat in a DMZ serving static content, forwarding (REST/WS) requests through a firewall to tomcat running on a server where other applications are also running:
YOU <> [FW:443] <> (NGINX) <> [FW:8443] <> (TOMCAT)
( APP1 )
( APP2 )
( DB )
Can I focus on just the nginx & tomcat applications in terms of patching CVEs/vulnerable dependencies, or must I ensure that all other applications are as 'CVE-free' as possible.
I believe this is different to this question about whether applications behind a public firewall need to be patched.
nginxfails to validate some user input, it's up to your back-end to deal with that problem. Something will get through and it's always better to secure every layer you can. I'm not gonna go into cost-effectiveness though, leaving that to the more knowledgeable. If someone manages to get a foothold inapp1and you only securedTomcat, attackers inapp1can accessapp2and your DB. – ChocolateOverflow Jun 05 '20 at 08:18