Patent attributes
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy may be provided that includes a set of security layers and a secure endpoint resolver, either of which may be provided and/or updated by a service provider. The security layers may be associated with policies that may be applicable to various network protocol layers (e.g., application layer). The security layers may be used to inspect, restrict and/or modify traffic between the trusted and untrusted environment to ensure data and network security. The secure endpoint resolver may be used, for example, by an application in the trusted environment, to obtain current service-related information such as the list of IP addresses currently associated with a service or service endpoint. Such endpoint information may be used, in turn, to update security layer policies such as a white list.