Changes for page eMagiz Security Guide
Last modified by Erik Bakker on 2024/08/20 08:53
From version 5.1
edited by eMagiz
on 2022/06/13 09:33
on 2022/06/13 09:33
Change comment:
There is no comment for this version
To version 15.1
edited by Erik Bakker
on 2022/06/13 13:36
on 2022/06/13 13:36
Change comment:
Renamed from xwiki:Migrated Pages fundamentals.eMagiz Security Guide
Summary
-
Page properties (2 modified, 0 added, 0 removed)
-
Attachments (0 modified, 6 added, 0 removed)
- fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png
- fundamental-emagiz-security-guide--access-rights.png
- fundamental-emagiz-security-guide--api-gateway-portal-feedback.png
- fundamental-emagiz-security-guide--create-new-version.png
- fundamental-emagiz-security-guide--data-orchestration.png
- fundamental-emagiz-security-guide--history-pages.png
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. marijn1 +XWiki.ebakker - Content
-
... ... @@ -1,7 +1,4 @@ 1 -{{html wiki="true"}} 2 -<div class="ez-academy"> 3 - <div class="ez-academy_body"> 4 -<div class="doc"> 1 +{{container}}{{container layoutStyle="columns"}}((( 5 5 6 6 7 7 ... ... @@ -11,9 +11,6 @@ 11 11 12 12 Should you have any questions, please get in touch with academy@emagiz.com. 13 13 14 -* Last update: February 17th, 2022 15 -* Required reading time: 15 minutes 16 - 17 17 == 1. Prerequisites == 18 18 19 19 * Some context on cloud functionality will be helpful. ... ... @@ -48,7 +48,7 @@ 48 48 * A bitbucket pipeline will be created soon to enable automatic updates. This data pipeline will also need a unique username/password combination along with the fact that the connection itself is a one-way SSL connection (encrypted) 49 49 * The repository is read-only for clients. This means that even if someone gets their hands on a username/password combination, they do not have sufficient rights to alter anything in the repository. They can only read the data that is kept in the repository. 50 50 51 - <palign="center">[[image:fundamental-emagiz-security-guide--definition-emagiz-model.png||]]</p>45 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--definition-emagiz-model.png]] 52 52 53 53 === 3.2 Security Guidelines * Cloud === 54 54 ... ... @@ -59,7 +59,7 @@ 59 59 The picture below shows a standard double-lane setup of an eMagiz instance within the eMagiz Cloud. A single-lane design looks similar but only consists of one core machine. 60 60 This gives insight into how messages flow through the Cloud, which measures are taken for monitoring and auto-healing, and where data is temporarily stored 'in transit.' 61 61 62 - <palign="center">[[image:fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png||]]</p>56 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png]] 63 63 64 64 We want to use this picture to explain specific components within the Cloud from a security perspective. We will start at the outside and work our way inwards. 65 65 ... ... @@ -148,7 +148,7 @@ 148 148 149 149 Let us first look at the data "in transit." This is the process phase where data is interchanged between flows within the eMagiz platform. This data interchange goes (i.e., from entry to onramp or offramp to exit) via the orchestration of the JMS server on the messaging layer. This is nicely shown in the picture below. 150 150 151 - <palign="center">[[image:fundamental-emagiz-security-guide--data-orchestration.png||]]</p>145 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--data-orchestration.png]] 152 152 153 153 Data "in transit" is temporarily stored on an encrypted filesystem with the help of encryption algorithms. 154 154 For the Cloud, eMagiz uses the AES-256 encryption algorithm. ... ... @@ -193,7 +193,7 @@ 193 193 194 194 As you can see in the picture shown below, the roles are defined so that the Read role can only access two integrations available for this specific API Gateway. If a client has insufficient rights, they will receive a 401 Unauthorized 195 195 196 - <palign="center">[[image:fundamental-emagiz-security-guide--api-gateway-portal-feedback.png||]]</p>190 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--api-gateway-portal-feedback.png]] 197 197 198 198 ===== 3.5.2.2 External IDP ===== 199 199 ... ... @@ -247,7 +247,7 @@ 247 247 * Model owners are assigned to integration projects by eMagiz Administrators 248 248 * An audit trail is kept of the changes made in the project permission structure 249 249 250 - <palign="center">[[image:fundamental-emagiz-security-guide--access-rights.png||]]</p>244 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--access-rights.png]] 251 251 252 252 ===== 3.6.1.4 Partner user access to Client environments ===== 253 253 ... ... @@ -268,9 +268,9 @@ 268 268 269 269 * In all the relevant parts of the integration project, developers can version the changes made. The type (major, minor, or patch) can be indicated and commented on to describe the change. Once the version is created, that particular version will be available for Deployment and is then kept in the history of changes on a low level. Both are illustrated in the pictures below. 270 270 271 - <palign="center">[[image:fundamental-emagiz-security-guide--create-new-version.png||]]</p>265 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--create-new-version.png]] 272 272 273 - <palign="center">[[image:fundamental-emagiz-security-guide--history-pages.png||]]</p>267 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--history-pages.png]] 274 274 275 275 * On a CDM level, the same functionality exists to indicate the version type incl. comments. All changes to the CDM model are logged in an audit trail that can help understand what changes are made by who in case of error resolution. The CDM is also protected by the permission structure of the Integration project. 276 276 ... ... @@ -326,8 +326,8 @@ 326 326 327 327 During these tests, the pentester will try to achieve goals (penetration of the target system on various levels) by undertaking various means. Such a test can help determine whether a system is vulnerable to attack if the defenses were sufficient and which defenses (if any) the test defeated. In addition, eventual findings from those tests are dealt with conforming to the corrective action processes in our ISMS. 328 328 329 -===== Practice ===== 330 330 324 + 331 331 == 4. Key takeaways == 332 332 333 333 * Protecting your data is a joint responsibility between eMagiz and you ... ... @@ -334,9 +334,4 @@ 334 334 * The repository is read-only for clients 335 335 * Data in the Cloud is kept within your VPC 336 336 * Production data in the portal is behind an MFA check 337 - 338 -</div> 339 -</div> 340 -</div> 341 - 342 -{{/html}} 331 +)))((({{toc/}}))){{/container}}{{/container}}
- fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ebakker - Size
-
... ... @@ -1,0 +1,1 @@ 1 +65.2 KB - Content
- fundamental-emagiz-security-guide--access-rights.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ebakker - Size
-
... ... @@ -1,0 +1,1 @@ 1 +9.1 KB - Content
- fundamental-emagiz-security-guide--api-gateway-portal-feedback.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ebakker - Size
-
... ... @@ -1,0 +1,1 @@ 1 +14.7 KB - Content
- fundamental-emagiz-security-guide--create-new-version.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ebakker - Size
-
... ... @@ -1,0 +1,1 @@ 1 +23.6 KB - Content
- fundamental-emagiz-security-guide--data-orchestration.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ebakker - Size
-
... ... @@ -1,0 +1,1 @@ 1 +160.8 KB - Content
- fundamental-emagiz-security-guide--history-pages.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ebakker - Size
-
... ... @@ -1,0 +1,1 @@ 1 +22.5 KB - Content