• Our service lets customers upload files of 3D models to our web server, which then arranges for the 3D model to be printed in the manufacturing lab. Users must have an account to use our service.
• We have two web servers behind a load balancer. The web server traffic then passes through a traditional firewall to the application servers.
• Two application servers run on virtual machines with Ubuntu as their operating system, and the firewall handles load balancing between the application servers. The application servers send files to the Design Server that uses Windows 10 as its operating system. The Design Server sends the printing jobs to the 3D printer.
Given the following architecture diagram, write a report that:
1. Gives a summary of the architecture as presented.
2. Identifies potential security risks of the architecture.
3. Proposes modifications or mitigations to the architecture to reduce the security risks you listed in #2, including any downsides to the changes.
4. Explains how you would perform a vulnerability assessment for the company's systems. Please address the entire architecture, specifying which aspects of security you would assess, which tools you would use for the assessment, and how each of those tools would be useful for this assessment.
Fig: 1