Changes for page eMagiz Security Guide

Last modified by Erik Bakker on 2024/08/20 08:53

From version 25.1
edited by Erik Bakker
on 2022/06/13 14:11
Change comment: There is no comment for this version
To version 12.1
edited by eMagiz
on 2022/06/13 09:34
Change comment: There is no comment for this version

Summary

Details

Page properties
Title
... ... @@ -1,1 +1,0 @@
1 -eMagiz Security Guide
Parent
... ... @@ -1,1 +1,0 @@
1 -WebHome
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.ebakker
1 +XWiki.marijn
Content
... ... @@ -1,8 +1,19 @@
1 -{{container}}{{container layoutStyle="columns"}}(((
1 +{{html wiki="true"}}
2 +<div class="ez-academy">
3 + <div class="ez-academy_body">
4 +<div class="doc">
5 +
6 +
7 +
8 += eMagiz Security Guide =
9 +
2 2  In this fundamental, we will zoom in on how the various parts of the eMagiz landscape can be viewed from a Security perspective. We will look at the Cloud, on-premises, data within eMagiz, external communication, and the portal during our journey. After this journey, you should have a solid understanding of what role security plays in each of the parts of the eMagiz architecture. Note that protecting your data is a joint responsibility between eMagiz and you. This fundamental aims to clarify the security measures eMagiz has taken in the eMagiz platform. This way, you can assess the eventual additional steps you need to take to ensure that the eMagiz service cooperates securely with the rest of your application and integration landscape.
3 3  
4 4  Should you have any questions, please get in touch with academy@emagiz.com.
5 5  
14 +* Last update: February 17th, 2022
15 +* Required reading time: 15 minutes
16 +
6 6  == 1. Prerequisites ==
7 7  
8 8  * Some context on cloud functionality will be helpful.
... ... @@ -14,6 +14,8 @@
14 14  * Data in the Cloud is kept within your VPC
15 15  * Production data in the portal is behind an MFA check
16 16  
28 +
29 +
17 17  == 3. eMagiz Security Guide ==
18 18  
19 19  In this fundamental, we will zoom in on how the various parts of the eMagiz landscape can be viewed from a Security perspective. We will look at the Cloud, on-premises, data within eMagiz, external communication, and the portal during our journey. After this journey, you should have a solid understanding of what role security plays in each of the parts of the eMagiz architecture. Note that protecting your data is a joint responsibility between eMagiz and you. This fundamental aims to clarify the security measures eMagiz has taken in the eMagiz platform. This way, you can assess the eventual additional steps you need to take to ensure that the eMagiz service cooperates securely with the rest of your application and integration landscape.
... ... @@ -35,7 +35,7 @@
35 35  * A bitbucket pipeline will be created soon to enable automatic updates. This data pipeline will also need a unique username/password combination along with the fact that the connection itself is a one-way SSL connection (encrypted)
36 36  * The repository is read-only for clients. This means that even if someone gets their hands on a username/password combination, they do not have sufficient rights to alter anything in the repository. They can only read the data that is kept in the repository.
37 37  
38 -[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--definition-emagiz-model.png]]
51 +<p align="center">[[image:fundamental-emagiz-security-guide--definition-emagiz-model.png||]]</p>
39 39  
40 40  === 3.2 Security Guidelines * Cloud ===
41 41  
... ... @@ -46,7 +46,7 @@
46 46  The picture below shows a standard double-lane setup of an eMagiz instance within the eMagiz Cloud. A single-lane design looks similar but only consists of one core machine.
47 47  This gives insight into how messages flow through the Cloud, which measures are taken for monitoring and auto-healing, and where data is temporarily stored 'in transit.'
48 48  
49 -[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png]]
62 +<p align="center">[[image:fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png||]]</p>
50 50  
51 51  We want to use this picture to explain specific components within the Cloud from a security perspective. We will start at the outside and work our way inwards.
52 52  
... ... @@ -73,7 +73,7 @@
73 73  * Monitoring
74 74  * Notification options
75 75  
76 -Making sure you are on the latest cloud template version guards yourself against vulnerabilities in older versions of Java and OS, for example. In addition, it gives the user more options for monitoring the health of the cloud environment reducing the risk of a loss of availability of data (promptly) without compromising the integrity of the data. For more information on what cloud templates are and how to control and update them, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagiz Cloud Management.novice-emagiz-cloud-management-cloud-templates-explained.WebHome||target="blank"]].
89 +Making sure you are on the latest cloud template version guards yourself against vulnerabilities in older versions of Java and OS, for example. In addition, it gives the user more options for monitoring the health of the cloud environment reducing the risk of a loss of availability of data (promptly) without compromising the integrity of the data. For more information on what cloud templates are and how to control and update them, please check out this [microlearning](../microlearning/novice-emagiz-cloud-management-cloud-templates-explained.md).
77 77  
78 78  ==== 3.2.5 Carwash ====
79 79  
... ... @@ -117,7 +117,7 @@
117 117  
118 118  Support engineers can see more to analyze problems on a lower level.
119 119  
120 -All other users don't have access to the cloud setup as there is no need for access because they can perform the relevant actions on the Cloud via the eMagiz portal. For more information on how please see the [[eMagiz Cloud Management>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagiz Cloud Management.WebHome||target="blank"]] course.
133 +All other users don't have access to the cloud setup as there is no need for access because they can perform the relevant actions on the Cloud via the eMagiz portal. For more information on how please see the [eMagiz Cloud Management](../microlearning/novice-emagiz-cloud-management-index) course.
121 121  
122 122  ===== 3.3.2.1 Rights for installing =====
123 123  
... ... @@ -135,7 +135,7 @@
135 135  
136 136  Let us first look at the data "in transit." This is the process phase where data is interchanged between flows within the eMagiz platform. This data interchange goes (i.e., from entry to onramp or offramp to exit) via the orchestration of the JMS server on the messaging layer. This is nicely shown in the picture below.
137 137  
138 -[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--data-orchestration.png]]
151 +<p align="center">[[image:fundamental-emagiz-security-guide--data-orchestration.png||]]</p>
139 139  
140 140  Data "in transit" is temporarily stored on an encrypted filesystem with the help of encryption algorithms.
141 141  For the Cloud, eMagiz uses the AES-256 encryption algorithm.
... ... @@ -180,7 +180,7 @@
180 180  
181 181  As you can see in the picture shown below, the roles are defined so that the Read role can only access two integrations available for this specific API Gateway. If a client has insufficient rights, they will receive a 401 Unauthorized
182 182  
183 -[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--api-gateway-portal-feedback.png]]
196 +<p align="center">[[image:fundamental-emagiz-security-guide--api-gateway-portal-feedback.png||]]</p>
184 184  
185 185  ===== 3.5.2.2 External IDP =====
186 186  
... ... @@ -194,7 +194,8 @@
194 194  
195 195  To prevent the error message if it occurs is sent straight back to the client, you can configure the front end of the API Gateway, so that correct HTTP Status codes are given back to the client, including a descriptive message.
196 196  
197 -For more information on how this precisely can be configured via the eMagiz platform, please check the following [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course API Gateway.crashcourse-api-gateway-configure-roles-and-users.WebHome||target="blank"]].
210 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [microlearning](../microlearning/crashcourse-api-gateway-configure-roles-and-users.md)
211 +
198 198  ==== 3.5.3 Event Streaming ====
199 199  
200 200  Within the Event Streaming solution, eMagiz provides Event Streaming users, and topics can be created.
... ... @@ -206,7 +206,7 @@
206 206  
207 207  These are all security measures to prevent third parties from getting unauthorized access to the data stored on the topics.
208 208  
209 -For more information on how this precisely can be configured via the eMagiz platform, please check the following [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Event Streaming.crashcourse-eventstreaming-user-management.WebHome||target="blank"]].
223 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [microlearning](../microlearning/crashcourse-eventstreaming-user-management.md)
210 210  
211 211  === 3.6 eMagiz iPaaS Portal ===
212 212  
... ... @@ -233,7 +233,7 @@
233 233  * Model owners are assigned to integration projects by eMagiz Administrators
234 234  * An audit trail is kept of the changes made in the project permission structure
235 235  
236 -[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--access-rights.png]]
250 +<p align="center">[[image:fundamental-emagiz-security-guide--access-rights.png||]]</p>
237 237  
238 238  ===== 3.6.1.4 Partner user access to Client environments =====
239 239  
... ... @@ -254,9 +254,9 @@
254 254  
255 255  * In all the relevant parts of the integration project, developers can version the changes made. The type (major, minor, or patch) can be indicated and commented on to describe the change. Once the version is created, that particular version will be available for Deployment and is then kept in the history of changes on a low level. Both are illustrated in the pictures below.
256 256  
257 -[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--create-new-version.png]]
271 +<p align="center">[[image:fundamental-emagiz-security-guide--create-new-version.png||]]</p>
258 258  
259 -[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--history-pages.png]]
273 +<p align="center">[[image:fundamental-emagiz-security-guide--history-pages.png||]]</p>
260 260  
261 261  * On a CDM level, the same functionality exists to indicate the version type incl. comments. All changes to the CDM model are logged in an audit trail that can help understand what changes are made by who in case of error resolution. The CDM is also protected by the permission structure of the Integration project.
262 262  
... ... @@ -298,7 +298,7 @@
298 298  
299 299  ==== 3.8.4 Data management ====
300 300  
301 -For more information on the conceptual ideas behind data management within the eMagiz platform, you can look at this [fundamental](fundamental-traceability-in-emagiz.md). For more concrete information on how to implement it within an eMagiz flow you could check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Advanced Level.Data Management.advanced-data-management-data-sink.WebHome||target="blank"]] and this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Advanced Level.Data Management.advanced-data-management-long-term-archiving.WebHome||target="blank"]]. All the information within the data sink and the long-term archiving solution is kept within the same VPC in the Cloud and can only be accessed by authorized parties.
315 +For more information on the conceptual ideas behind data management within the eMagiz platform, you can look at this [fundamental](fundamental-traceability-in-emagiz.md). For more concrete information on how to implement it within an eMagiz flow you could check out this [microlearning](../microlearning/advanced-data-management-data-sink.md) and this [microlearning](../microlearning/advanced-data-management-long-term-archiving.md). All the information within the data sink and the long-term archiving solution is kept within the same VPC in the Cloud and can only be accessed by authorized parties.
302 302  
303 303  === 3.9 Compliancy ===
304 304  
... ... @@ -312,6 +312,8 @@
312 312  
313 313  During these tests, the pentester will try to achieve goals (penetration of the target system on various levels) by undertaking various means. Such a test can help determine whether a system is vulnerable to attack if the defenses were sufficient and which defenses (if any) the test defeated. In addition, eventual findings from those tests are dealt with conforming to the corrective action processes in our ISMS.
314 314  
329 +===== Practice =====
330 +
315 315  == 4. Key takeaways ==
316 316  
317 317  * Protecting your data is a joint responsibility between eMagiz and you
... ... @@ -318,4 +318,9 @@
318 318  * The repository is read-only for clients
319 319  * Data in the Cloud is kept within your VPC
320 320  * Production data in the portal is behind an MFA check
321 -)))((({{toc/}}))){{/container}}{{/container}}
337 +
338 +</div>
339 +</div>
340 +</div>
341 +
342 +{{/html}}
fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.marijn
Size
... ... @@ -1,0 +1,1 @@
1 +65.2 KB
Content
fundamental-emagiz-security-guide--access-rights.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.marijn
Size
... ... @@ -1,0 +1,1 @@
1 +9.1 KB
Content
fundamental-emagiz-security-guide--api-gateway-portal-feedback.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.marijn
Size
... ... @@ -1,0 +1,1 @@
1 +14.7 KB
Content
fundamental-emagiz-security-guide--create-new-version.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.marijn
Size
... ... @@ -1,0 +1,1 @@
1 +23.6 KB
Content
fundamental-emagiz-security-guide--data-orchestration.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.marijn
Size
... ... @@ -1,0 +1,1 @@
1 +160.8 KB
Content
fundamental-emagiz-security-guide--definition-emagiz-model.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.marijn
Size
... ... @@ -1,0 +1,1 @@
1 +63.3 KB
Content
fundamental-emagiz-security-guide--history-pages.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.marijn
Size
... ... @@ -1,0 +1,1 @@
1 +22.5 KB
Content