Changes for page eMagiz Security Guide

Last modified by Erik Bakker on 2023/01/02 10:25

From version 13.1
edited by eMagiz
on 2022/06/13 09:34
Change comment: There is no comment for this version
To version 14.1
edited by Erik Bakker
on 2022/06/13 12:37
Change comment: Imported from XAR

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.marijn
1 +XWiki.ebakker
Content
... ... @@ -1,7 +1,4 @@
1 -{{html wiki="true"}}
2 -<div class="ez-academy">
3 - <div class="ez-academy_body">
4 -<div class="doc">
1 +{{container}}{{container layoutStyle="columns"}}(((
5 5  
6 6  
7 7  
... ... @@ -11,9 +11,6 @@
11 11  
12 12  Should you have any questions, please get in touch with academy@emagiz.com.
13 13  
14 -* Last update: February 17th, 2022
15 -* Required reading time: 15 minutes
16 -
17 17  == 1. Prerequisites ==
18 18  
19 19  * Some context on cloud functionality will be helpful.
... ... @@ -48,7 +48,7 @@
48 48  * A bitbucket pipeline will be created soon to enable automatic updates. This data pipeline will also need a unique username/password combination along with the fact that the connection itself is a one-way SSL connection (encrypted)
49 49  * The repository is read-only for clients. This means that even if someone gets their hands on a username/password combination, they do not have sufficient rights to alter anything in the repository. They can only read the data that is kept in the repository.
50 50  
51 -<p align="center">[[image:fundamental-emagiz-security-guide--definition-emagiz-model.png||]]</p>
45 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--definition-emagiz-model.png]]
52 52  
53 53  === 3.2 Security Guidelines * Cloud ===
54 54  
... ... @@ -59,7 +59,7 @@
59 59  The picture below shows a standard double-lane setup of an eMagiz instance within the eMagiz Cloud. A single-lane design looks similar but only consists of one core machine.
60 60  This gives insight into how messages flow through the Cloud, which measures are taken for monitoring and auto-healing, and where data is temporarily stored 'in transit.'
61 61  
62 -<p align="center">[[image:fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png||]]</p>
56 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-cloud-inner-workings--customer-level-overview-double-lane.png]]
63 63  
64 64  We want to use this picture to explain specific components within the Cloud from a security perspective. We will start at the outside and work our way inwards.
65 65  
... ... @@ -148,7 +148,7 @@
148 148  
149 149  Let us first look at the data "in transit." This is the process phase where data is interchanged between flows within the eMagiz platform. This data interchange goes (i.e., from entry to onramp or offramp to exit) via the orchestration of the JMS server on the messaging layer. This is nicely shown in the picture below.
150 150  
151 -<p align="center">[[image:fundamental-emagiz-security-guide--data-orchestration.png||]]</p>
145 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--data-orchestration.png]]
152 152  
153 153  Data "in transit" is temporarily stored on an encrypted filesystem with the help of encryption algorithms.
154 154  For the Cloud, eMagiz uses the AES-256 encryption algorithm.
... ... @@ -193,7 +193,7 @@
193 193  
194 194  As you can see in the picture shown below, the roles are defined so that the Read role can only access two integrations available for this specific API Gateway. If a client has insufficient rights, they will receive a 401 Unauthorized
195 195  
196 -<p align="center">[[image:fundamental-emagiz-security-guide--api-gateway-portal-feedback.png||]]</p>
190 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--api-gateway-portal-feedback.png]]
197 197  
198 198  ===== 3.5.2.2 External IDP =====
199 199  
... ... @@ -247,7 +247,7 @@
247 247  * Model owners are assigned to integration projects by eMagiz Administrators
248 248  * An audit trail is kept of the changes made in the project permission structure
249 249  
250 -<p align="center">[[image:fundamental-emagiz-security-guide--access-rights.png||]]</p>
244 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--access-rights.png]]
251 251  
252 252  ===== 3.6.1.4 Partner user access to Client environments =====
253 253  
... ... @@ -268,9 +268,9 @@
268 268  
269 269  * In all the relevant parts of the integration project, developers can version the changes made. The type (major, minor, or patch) can be indicated and commented on to describe the change. Once the version is created, that particular version will be available for Deployment and is then kept in the history of changes on a low level. Both are illustrated in the pictures below.
270 270  
271 -<p align="center">[[image:fundamental-emagiz-security-guide--create-new-version.png||]]</p>
265 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--create-new-version.png]]
272 272  
273 -<p align="center">[[image:fundamental-emagiz-security-guide--history-pages.png||]]</p>
267 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--history-pages.png]]
274 274  
275 275  * On a CDM level, the same functionality exists to indicate the version type incl. comments. All changes to the CDM model are logged in an audit trail that can help understand what changes are made by who in case of error resolution. The CDM is also protected by the permission structure of the Integration project.
276 276  
... ... @@ -326,8 +326,8 @@
326 326  
327 327  During these tests, the pentester will try to achieve goals (penetration of the target system on various levels) by undertaking various means. Such a test can help determine whether a system is vulnerable to attack if the defenses were sufficient and which defenses (if any) the test defeated. In addition, eventual findings from those tests are dealt with conforming to the corrective action processes in our ISMS.
328 328  
329 -===== Practice =====
330 330  
324 +
331 331  == 4. Key takeaways ==
332 332  
333 333  * Protecting your data is a joint responsibility between eMagiz and you
... ... @@ -334,9 +334,4 @@
334 334  * The repository is read-only for clients
335 335  * Data in the Cloud is kept within your VPC
336 336  * Production data in the portal is behind an MFA check
337 -
338 -</div>
339 -</div>
340 -</div>
341 -
342 -{{/html}}
331 +)))((({{toc/}}))){{/container}}{{/container}}