Security Requirements

  • Network Isolation – Dedicated clusters can be deployed in a VPC with dedicated firewalls. Access must be granted by an IP access list or VPC peering

  • Roles-based access management – Configure sophisticated role-based access rules to control which users and teams can access, manipulate, and delete data in your databases.

  • End-to-End encryption – All network traffic is encrypted using TLS, with flexibility to configure the minimum TLS protocol version, encryption for data at rest is automated using encrypted storage volumes. Enable automatic client-side field level encryption to encrypt sensitive data before it leaves the application and land in the cloud.

System Level Security - This feature allows one to offer access at different levels for example the access reach of any particular user or user group under admin. User Management – User managements comes an entire module inside BDB module where admin can manage various permissions, restrictions related to user & user group. Any user or user group can be assigned or restricted to use various other plug-ins & features of platform. In addition, custom field settings can be created & mapped with the user & user group properties. Data Level Security – Data level security becomes crucial when a large part of organization is involved in it. This feature provides organization a custom, scalable method of applying security across their entire user base. BDB maintains data level security which lets user restrict data insights only to desired audience.

  • Object Level security

  • Row level security

  • Data at rest are password protected inside DMZ.

For many internal deployments, network security is provided by preventing access to the network as a whole. However, even in these cases it is important to securely transmit credentials across the network. For external deployments, transmission security is critical to protect sensitive data and credentials and to prevent malicious use of BDB Platform.

There are the following main network interfaces to the BDB Platform:

  • Configures HTTPS (SSL) with customer supplied security certificates.

  • BDB Platform-to-database uses native drivers whenever possible and uses generic ODBC adapters when native drivers are not available.

  • Secure communication between BDB Platform Server components is only applicable in distributed deployments and is done using a stringent trust model to ensure each server receives valid requests from other servers in the cluster.

  • Securing network transmission, all user passwords and credentials are encrypted in transmission and passwords are not stored in clear text.

BDB Data Pipeline has bult-in Data Loss Protection component which enables masking, hashing, Redaction & Date generalization.

Last updated