Changes for page eMagiz Security Guide
Last modified by Erik Bakker on 2024/08/20 08:53
From version 15.1
edited by Erik Bakker
on 2022/06/13 13:36
on 2022/06/13 13:36
Change comment:
Renamed from xwiki:Migrated Pages fundamentals.eMagiz Security Guide
To version 25.1
edited by Erik Bakker
on 2022/06/13 14:11
on 2022/06/13 14:11
Change comment:
There is no comment for this version
Summary
-
Page properties (3 modified, 0 added, 0 removed)
-
Attachments (0 modified, 0 added, 7 removed)
- fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png
- fundamental-emagiz-security-guide--access-rights.png
- fundamental-emagiz-security-guide--api-gateway-portal-feedback.png
- fundamental-emagiz-security-guide--create-new-version.png
- fundamental-emagiz-security-guide--data-orchestration.png
- fundamental-emagiz-security-guide--definition-emagiz-model.png
- fundamental-emagiz-security-guide--history-pages.png
Details
- Page properties
-
- Title
-
... ... @@ -1,0 +1,1 @@ 1 +eMagiz Security Guide - Parent
-
... ... @@ -1,0 +1,1 @@ 1 +WebHome - Content
-
... ... @@ -1,9 +1,4 @@ 1 1 {{container}}{{container layoutStyle="columns"}}((( 2 - 3 - 4 - 5 -= eMagiz Security Guide = 6 - 7 7 In this fundamental, we will zoom in on how the various parts of the eMagiz landscape can be viewed from a Security perspective. We will look at the Cloud, on-premises, data within eMagiz, external communication, and the portal during our journey. After this journey, you should have a solid understanding of what role security plays in each of the parts of the eMagiz architecture. Note that protecting your data is a joint responsibility between eMagiz and you. This fundamental aims to clarify the security measures eMagiz has taken in the eMagiz platform. This way, you can assess the eventual additional steps you need to take to ensure that the eMagiz service cooperates securely with the rest of your application and integration landscape. 8 8 9 9 Should you have any questions, please get in touch with academy@emagiz.com. ... ... @@ -19,8 +19,6 @@ 19 19 * Data in the Cloud is kept within your VPC 20 20 * Production data in the portal is behind an MFA check 21 21 22 - 23 - 24 24 == 3. eMagiz Security Guide == 25 25 26 26 In this fundamental, we will zoom in on how the various parts of the eMagiz landscape can be viewed from a Security perspective. We will look at the Cloud, on-premises, data within eMagiz, external communication, and the portal during our journey. After this journey, you should have a solid understanding of what role security plays in each of the parts of the eMagiz architecture. Note that protecting your data is a joint responsibility between eMagiz and you. This fundamental aims to clarify the security measures eMagiz has taken in the eMagiz platform. This way, you can assess the eventual additional steps you need to take to ensure that the eMagiz service cooperates securely with the rest of your application and integration landscape. ... ... @@ -80,7 +80,7 @@ 80 80 * Monitoring 81 81 * Notification options 82 82 83 -Making sure you are on the latest cloud template version guards yourself against vulnerabilities in older versions of Java and OS, for example. In addition, it gives the user more options for monitoring the health of the cloud environment reducing the risk of a loss of availability of data (promptly) without compromising the integrity of the data. For more information on what cloud templates are and how to control and update them, please check out this [microlearning ](../microlearning/novice-emagiz-cloud-management-cloud-templates-explained.md).76 +Making sure you are on the latest cloud template version guards yourself against vulnerabilities in older versions of Java and OS, for example. In addition, it gives the user more options for monitoring the health of the cloud environment reducing the risk of a loss of availability of data (promptly) without compromising the integrity of the data. For more information on what cloud templates are and how to control and update them, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagiz Cloud Management.novice-emagiz-cloud-management-cloud-templates-explained.WebHome||target="blank"]]. 84 84 85 85 ==== 3.2.5 Carwash ==== 86 86 ... ... @@ -124,7 +124,7 @@ 124 124 125 125 Support engineers can see more to analyze problems on a lower level. 126 126 127 -All other users don't have access to the cloud setup as there is no need for access because they can perform the relevant actions on the Cloud via the eMagiz portal. For more information on how please see the [eMagiz Cloud Management ](../microlearning/novice-emagiz-cloud-management-index)course.120 +All other users don't have access to the cloud setup as there is no need for access because they can perform the relevant actions on the Cloud via the eMagiz portal. For more information on how please see the [[eMagiz Cloud Management>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagiz Cloud Management.WebHome||target="blank"]] course. 128 128 129 129 ===== 3.3.2.1 Rights for installing ===== 130 130 ... ... @@ -201,8 +201,7 @@ 201 201 202 202 To prevent the error message if it occurs is sent straight back to the client, you can configure the front end of the API Gateway, so that correct HTTP Status codes are given back to the client, including a descriptive message. 203 203 204 -For more information on how this precisely can be configured via the eMagiz platform, please check the following [microlearning](../microlearning/crashcourse-api-gateway-configure-roles-and-users.md) 205 - 197 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course API Gateway.crashcourse-api-gateway-configure-roles-and-users.WebHome||target="blank"]]. 206 206 ==== 3.5.3 Event Streaming ==== 207 207 208 208 Within the Event Streaming solution, eMagiz provides Event Streaming users, and topics can be created. ... ... @@ -214,7 +214,7 @@ 214 214 215 215 These are all security measures to prevent third parties from getting unauthorized access to the data stored on the topics. 216 216 217 -For more information on how this precisely can be configured via the eMagiz platform, please check the following [microlearning ](../microlearning/crashcourse-eventstreaming-user-management.md)209 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Event Streaming.crashcourse-eventstreaming-user-management.WebHome||target="blank"]]. 218 218 219 219 === 3.6 eMagiz iPaaS Portal === 220 220 ... ... @@ -306,7 +306,7 @@ 306 306 307 307 ==== 3.8.4 Data management ==== 308 308 309 -For more information on the conceptual ideas behind data management within the eMagiz platform, you can look at this [fundamental](fundamental-traceability-in-emagiz.md). For more concrete information on how to implement it within an eMagiz flow you could check out this [microlearning ](../microlearning/advanced-data-management-data-sink.md)and this [microlearning](../microlearning/advanced-data-management-long-term-archiving.md). All the information within the data sink and the long-term archiving solution is kept within the same VPC in the Cloud and can only be accessed by authorized parties.301 +For more information on the conceptual ideas behind data management within the eMagiz platform, you can look at this [fundamental](fundamental-traceability-in-emagiz.md). For more concrete information on how to implement it within an eMagiz flow you could check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Advanced Level.Data Management.advanced-data-management-data-sink.WebHome||target="blank"]] and this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Advanced Level.Data Management.advanced-data-management-long-term-archiving.WebHome||target="blank"]]. All the information within the data sink and the long-term archiving solution is kept within the same VPC in the Cloud and can only be accessed by authorized parties. 310 310 311 311 === 3.9 Compliancy === 312 312 ... ... @@ -320,8 +320,6 @@ 320 320 321 321 During these tests, the pentester will try to achieve goals (penetration of the target system on various levels) by undertaking various means. Such a test can help determine whether a system is vulnerable to attack if the defenses were sufficient and which defenses (if any) the test defeated. In addition, eventual findings from those tests are dealt with conforming to the corrective action processes in our ISMS. 322 322 323 - 324 - 325 325 == 4. Key takeaways == 326 326 327 327 * Protecting your data is a joint responsibility between eMagiz and you
- fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.ebakker - Size
-
... ... @@ -1,1 +1,0 @@ 1 -65.2 KB - Content
- fundamental-emagiz-security-guide--access-rights.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.ebakker - Size
-
... ... @@ -1,1 +1,0 @@ 1 -9.1 KB - Content
- fundamental-emagiz-security-guide--api-gateway-portal-feedback.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.ebakker - Size
-
... ... @@ -1,1 +1,0 @@ 1 -14.7 KB - Content
- fundamental-emagiz-security-guide--create-new-version.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.ebakker - Size
-
... ... @@ -1,1 +1,0 @@ 1 -23.6 KB - Content
- fundamental-emagiz-security-guide--data-orchestration.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.ebakker - Size
-
... ... @@ -1,1 +1,0 @@ 1 -160.8 KB - Content
- fundamental-emagiz-security-guide--definition-emagiz-model.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.ebakker - Size
-
... ... @@ -1,1 +1,0 @@ 1 -63.3 KB - Content
- fundamental-emagiz-security-guide--history-pages.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.ebakker - Size
-
... ... @@ -1,1 +1,0 @@ 1 -22.5 KB - Content