Changes for page eMagiz Security Guide
Last modified by Erik Bakker on 2024/08/20 08:53
From version 22.1
edited by Erik Bakker
on 2022/06/13 13:37
on 2022/06/13 13:37
Change comment:
Deleted image "fundamental-emagiz-security-guide--definition-emagiz-model.png"
To version 36.1
edited by Erik Bakker
on 2024/08/05 16:26
on 2024/08/05 16:26
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 0 added, 1 removed)
Details
- Page properties
-
- Content
-
... ... @@ -1,5 +1,5 @@ 1 1 {{container}}{{container layoutStyle="columns"}}((( 2 - In this fundamental, we willzoominnhowthevariousparts of the eMagiz landscapecan be viewed from a Security perspective. Wewill lookattheCloud,on-premises, datawithineMagiz, externalcommunication, andthe portal during our journey.After this journey,youshould have a solid understandingof what role security plays in eachof thepartsof the eMagiz architecture.Notehat protecting your data isa joint responsibility between eMagiz andyou. This fundamental aims to clarify the security measures eMagiz has taken in the eMagiz platform. This way, you can assess the eventualadditional steps you need to take to ensure that the eMagiz service cooperates securely with the rest of your application and integration landscape.2 +in this fundamental, we will delve into the security perspective of the eMagiz landscape. We'll explore the cloud setup, data protection, and more to understand the role security plays in each part of the eMagiz architecture. Let's dive in! 3 3 4 4 Should you have any questions, please get in touch with academy@emagiz.com. 5 5 ... ... @@ -12,7 +12,7 @@ 12 12 * Protecting your data is a joint responsibility between eMagiz and you 13 13 * The repository is read-only for clients 14 14 * Data in the Cloud is kept within your VPC 15 -* Production data in the portal is behind an MFA check15 +* The portal is behind an MFA check 16 16 17 17 == 3. eMagiz Security Guide == 18 18 ... ... @@ -37,7 +37,7 @@ 37 37 38 38 [[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--definition-emagiz-model.png]] 39 39 40 -=== 3.2 Security Guidelines *Cloud ===40 +=== 3.2 Security Guidelines - Cloud === 41 41 42 42 In this section, we take a closer look at the cloud setup in general. Here we will focus on high-level security measurements because we already specified security measurements at the data level. 43 43 ... ... @@ -73,7 +73,7 @@ 73 73 * Monitoring 74 74 * Notification options 75 75 76 -Making sure you are on the latest cloud template version guards yourself against vulnerabilities in older versions of Java and OS, for example. In addition, it gives the user more options for monitoring the health of the cloud environment reducing the risk of a loss of availability of data (promptly) without compromising the integrity of the data. For more information on what cloud templates are and how to control and update them, please check out this [microlearning ](../microlearning/novice-emagiz-cloud-management-cloud-templates-explained.md).76 +Making sure you are on the latest cloud template version guards yourself against vulnerabilities in older versions of Java and OS, for example. In addition, it gives the user more options for monitoring the health of the cloud environment reducing the risk of a loss of availability of data (promptly) without compromising the integrity of the data. For more information on what cloud templates are and how to control and update them, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagiz Cloud Management.novice-emagiz-cloud-management-cloud-templates-explained||target="blank"]]. 77 77 78 78 ==== 3.2.5 Carwash ==== 79 79 ... ... @@ -117,7 +117,7 @@ 117 117 118 118 Support engineers can see more to analyze problems on a lower level. 119 119 120 -All other users don't have access to the cloud setup as there is no need for access because they can perform the relevant actions on the Cloud via the eMagiz portal. For more information on how please see the [eMagiz Cloud Management ](../microlearning/novice-emagiz-cloud-management-index)course.120 +All other users don't have access to the cloud setup as there is no need for access because they can perform the relevant actions on the Cloud via the eMagiz portal. For more information on how please see the [[eMagiz Cloud Management>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagiz Cloud Management.WebHome||target="blank"]] course. 121 121 122 122 ===== 3.3.2.1 Rights for installing ===== 123 123 ... ... @@ -174,7 +174,7 @@ 174 174 175 175 ==== 3.5.2 API Gateway ==== 176 176 177 -A structure with roles and rights per role can be specified within the portal or via an external IDP to secure the front end of the API Gateway in eMagiz. 177 +A structure with roles and rights per role can be specified within the portal or via an external IDP to secure the front end of the API Gateway in eMagiz. For the backend of the API Gateway, the same logic applies as stated above for messaging, which means that eMagiz supports the industry standard. Therefore, you as a user should confer with the external party about the correct method. 178 178 179 179 ===== 3.5.2.1 Portal ===== 180 180 ... ... @@ -182,20 +182,17 @@ 182 182 183 183 [[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--api-gateway-portal-feedback.png]] 184 184 185 -===== 3.5.2.2 External IDP ===== 185 +===== 3.5.2.2 (External) IDP ===== 186 186 187 -Apart from configuring the roles, users, and rights within the portal itself, it is also possible to hook the API Gateway up to an external IDP. 187 +Apart from configuring the roles, users, and rights within the portal itself, it is also possible to hook the API Gateway up to an (external) IDP. 188 188 By communicating with this IDP via the OAuth2.0 protocol, a check is done every time a client calls a specific operation to see whether that client has sufficient rights to access the operation. 189 189 If the client has sufficient rights, the process continues. For example, if the client has insufficient rights, the client receives a 401 Unauthorized. 190 190 191 -For the backend of the API Gateway, the same logic applies as stated above for messaging, which means that eMagiz supports the industry standard. Therefore, you as a user should confer with the external party about the correct method. 192 - 193 193 ===== 3.5.2.3 Error handling ===== 194 194 195 195 To prevent the error message if it occurs is sent straight back to the client, you can configure the front end of the API Gateway, so that correct HTTP Status codes are given back to the client, including a descriptive message. 196 196 197 -For more information on how this precisely can be configured via the eMagiz platform, please check the following [microlearning](../microlearning/crashcourse-api-gateway-configure-roles-and-users.md) 198 - 195 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course API Gateway.crashcourse-api-gateway-configure-roles-and-users||target="blank"]]. 199 199 ==== 3.5.3 Event Streaming ==== 200 200 201 201 Within the Event Streaming solution, eMagiz provides Event Streaming users, and topics can be created. ... ... @@ -207,8 +207,9 @@ 207 207 208 208 These are all security measures to prevent third parties from getting unauthorized access to the data stored on the topics. 209 209 210 -For more information on how this precisely can be configured via the eMagiz platform, please check the following [microlearning ](../microlearning/crashcourse-eventstreaming-user-management.md)207 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Event Streaming.crashcourse-eventstreaming-user-management||target="blank"]]. 211 211 209 + 212 212 === 3.6 eMagiz iPaaS Portal === 213 213 214 214 The eMagiz portal provides access to users to manage their eMagiz integration configurations. It provides access to all the features to develop, deploy and manage integrations across Test, Acceptance, and Production environments. ... ... @@ -217,8 +217,8 @@ 217 217 218 218 ===== 3.6.1.1 User access to https://my.emagiz.com ===== 219 219 220 -Users can be added with their email address by the eMagiz Partner Manager, upon which the user gets an email to sign in. A temporary password is created and emailed, which has to be changed at the first login to the iPaaS portal. In addition, users are connected to organizations in eMagiz. 221 -In the administration section of the user, an MFA to kencan be used to enabletheMultifactorAuthenticationon auserlevel. Typical authenticators on a smartphone can be used, such as Google Authenticator. An MFA response is required for model owners to manage the permissions on aprojectleveland any Edit activity in Production environments. See the following sections for more details on these functions.218 +Users can be added with their email address by the eMagiz Partner Manager or by their company contact, upon which the user gets an email to sign in. A temporary password is created and emailed, which has to be changed at the first login to the iPaaS portal. In addition, users are connected to organizations in eMagiz. 219 +In the administration section of the user, upon first login an MFA configuration needs to be executed by the user so they can access models to which they have been granted rights. Typical authenticators on a smartphone can be used, such as Google Authenticator. For more information, check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-security-add-mfa.WebHome||target="blank"]]. An MFA response is required for model owners to manage the permissions on a model level. See the following sections for more details on these functions. 222 222 223 223 ===== 3.6.1.2 Users access to Integration Projects ===== 224 224 ... ... @@ -226,7 +226,7 @@ 226 226 227 227 ===== 3.6.1.3 User authorizations to Integration projects. ===== 228 228 229 -Every integration project has a model owner who can distribute rights across functionalities and environments. The picture below shows the various options available across the Integration Life Cycle (ILM) Phases Capture through Manage. In addition, the model owner manages the user permissions and needs to have the MFA authentication level passed before making any changes. 227 +Every integration project has a model owner who can distribute rights across functionalities and environments. The picture below shows the various options available across the Integration Life Cycle (ILM) Phases Capture through Manage. In addition, the model owner manages the user permissions and needs to have the MFA authentication level passed before making any changes (which is asked of the model owner upon login). 230 230 231 231 * When Edit permission is granted on an ILM phase, all the sub-options are configurable 232 232 * View rights mean that all options can be viewed only ... ... @@ -299,11 +299,12 @@ 299 299 300 300 ==== 3.8.4 Data management ==== 301 301 302 -For more information on the conceptual ideas behind data management within the eMagiz platform, you can look at this [fundamental ](fundamental-traceability-in-emagiz.md).For more concrete information on how to implement it within an eMagiz flow you could check out this [microlearning](../microlearning/advanced-data-management-data-sink.md)and this [microlearning](../microlearning/advanced-data-management-long-term-archiving.md).All the information within the data sink and the long-term archiving solution is kept within the same VPC in the Cloud and can only be accessed by authorized parties.303 - 300 +For more information on the conceptual ideas behind data management within the eMagiz platform, you can look at this [[fundamental>>doc:Main.eMagiz Academy.Fundamentals.fundamental-traceability-in-emagiz||target="blank"]]. For more concrete information on how to implement it within an eMagiz flow you could check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Advanced Level.Data Management.advanced-data-management-data-sink||target="blank"]] and this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Advanced Level.Data Management.advanced-data-management-long-term-archiving||target="blank"]]. All the information within the data sink and the long-term archiving solution is kept within the same VPC in the Cloud and can only be accessed by authorized parties. 301 + 304 304 === 3.9 Compliancy === 305 305 306 -* eMagiz has the ISO-27001 certification at this moment. 304 +* eMagiz is currentlty ISO-27001 certified. 305 +* eMagiz is currently SOC2 Type 2 certified. 307 307 308 308 === 3.10 Other === 309 309 ... ... @@ -318,5 +318,22 @@ 318 318 * Protecting your data is a joint responsibility between eMagiz and you 319 319 * The repository is read-only for clients 320 320 * Data in the Cloud is kept within your VPC 321 -* Production data in the portal is behind an MFA check 320 +* The portal is behind an MFA check 321 + 322 +== 5. Suggested additional readings == 323 + 324 +* [[Fundamental (Navigation)>>doc:Main.eMagiz Academy.Fundamentals.WebHome||target="blank"]] 325 +** [[eMagiz Cloud (Explanation)>>doc:Main.eMagiz Academy.Fundamentals.fundamental-emagiz-cloud-inner-workings.WebHome||target="blank"]] 326 +** [[Traceability (Explanation)>>doc:Main.eMagiz Academy.Fundamentals.fundamental-traceability-in-emagiz.WebHome||target="blank"]] 327 +* [[Crash Courses (Menu)>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.WebHome||target="blank"]] 328 +* [[Novice Level (Menu)>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.WebHome||target="blank"]] 329 +** [[eMagiz Cloud Management (Navigation)>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagiz Cloud Management.WebHome||target="blank"]] 330 +*** [[Cloud Templates Explained (Explanation)>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagiz Cloud Management.novice-emagiz-cloud-management-cloud-templates-explained||target="blank"]] 331 + 332 +[[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course API Gateway.crashcourse-api-gateway-configure-roles-and-users||target="blank"]] 333 +[[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Event Streaming.crashcourse-eventstreaming-user-management||target="blank"]] 334 +[[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-security-add-mfa.WebHome||target="blank"]] 335 +[[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Advanced Level.Data Management.advanced-data-management-data-sink||target="blank"]] 336 +[[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Advanced Level.Data Management.advanced-data-management-long-term-archiving||target="blank"]] 337 +[[microlearning>>doc:Main.eMagiz Academy.Fundamentals.fundamental-traceability-in-emagiz||target="blank"]] 322 322 )))((({{toc/}}))){{/container}}{{/container}}
- fundamental-emagiz-security-guide--history-pages.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.ebakker - Size
-
... ... @@ -1,1 +1,0 @@ 1 -22.5 KB - Content