Pre Sales
  • BDB Pre Sales
  • Manufacturing Use Case
    • Introduction
    • How is BDB different than Azure, AWS, or GCP?
    • Project Definition and Requirements
      • Functional Requirements
      • Technical Requirements
      • Non-Functional Requirements
      • Project Deliverables
    • Functional Requirements from Manufacturing
    • Technical Requirements
      • Data Ingestion
      • Data Processing (Batch Data)
      • Data Processing (Real-Time Data)
      • Data Preparation
      • Data Store(Data Lake)
      • Data Store (Enterprise Datawarehouse)
      • Query Engine
      • Data Visualization
      • BDB Search
      • Advanced Analytics and Data Science
    • Data Services
    • Security Requirements
    • Networking Requirements
    • Operational Requirement
    • Non-Functional Requirements
      • Scalability
      • Availability
    • Data Platform Benchmarking
    • Hardware Sizing Requirements
  • Data Platform Evaluation Criteria
    • Data Preparation
    • Data Platform Evaluation Highlights
    • Data Pipeline
    • Ingestion Connector
      • Seamless Handling of Data ops and ML ops
    • Ingestion Process
      • Building a path from ingestion to analytics
    • Data Preparation
      • Processing Modern Data Pipeline
  • BDB POC Approach
  • BDB Vertical Analytics
  • Technical FAQs
    • Data Platform
    • Administration
    • Data Security & Privacy
    • Analytics
    • Data Preparation
    • Data Pipeline
    • Dashboard Designer
    • Business Story
    • Performance & Scalability
    • Global and Embeddable
    • Deployability
    • User Experience
    • Support & Licensing
    • AI
    • Change Management
Powered by GitBook
On this page
  1. Manufacturing Use Case

Security Requirements

PreviousData ServicesNextNetworking Requirements

Last updated 2 years ago

  • Network Isolation – Dedicated clusters can be deployed in a VPC with dedicated firewalls. Access must be granted by an IP access list or VPC peering

  • Roles-based access management – Configure sophisticated role-based access rules to control which users and teams can access, manipulate, and delete data in your databases.

  • End-to-End encryption – All network traffic is encrypted using TLS, with flexibility to configure the minimum TLS protocol version, encryption for data at rest is automated using encrypted storage volumes. Enable automatic client-side field level encryption to encrypt sensitive data before it leaves the application and land in the cloud.

System Level Security - This feature allows one to offer access at different levels for example the access reach of any particular user or user group under admin. User Management – User managements comes an entire module inside BDB module where admin can manage various permissions, restrictions related to user & user group. Any user or user group can be assigned or restricted to use various other plug-ins & features of platform. In addition, custom field settings can be created & mapped with the user & user group properties. Data Level Security – Data level security becomes crucial when a large part of organization is involved in it. This feature provides organization a custom, scalable method of applying security across their entire user base. BDB maintains data level security which lets user restrict data insights only to desired audience.

  • Object Level security

  • Row level security

  • Data at rest are password protected inside DMZ.

For many internal deployments, network security is provided by preventing access to the network as a whole. However, even in these cases it is important to securely transmit credentials across the network. For external deployments, transmission security is critical to protect sensitive data and credentials and to prevent malicious use of BDB Platform.

There are the following main network interfaces to the BDB Platform:

  • Configures HTTPS (SSL) with customer supplied security certificates.

  • BDB Platform-to-database uses native drivers whenever possible and uses generic ODBC adapters when native drivers are not available.

  • Secure communication between BDB Platform Server components is only applicable in distributed deployments and is done using a stringent trust model to ensure each server receives valid requests from other servers in the cluster.

  • Securing network transmission, all user passwords and credentials are encrypted in transmission and passwords are not stored in clear text.

BDB Data Pipeline has bult-in Data Loss Protection component which enables masking, hashing, Redaction & Date generalization.