Securing a Teracloud® Streams cluster
While applications are deployed into production environments with specific recommendations that apply to individual customers, enterprise organizations generally have security policies and procedures that must be met and followed. To meet enterprise requirements, a combination of product and environment configuration is needed. The following are some key features using the standard information security CIA triad.
Maintaining confidentiality:
- Granular access control: Teracloud® Streams uses access control lists (ACLs) to manage user authorization for domains and instances. An ACL contains the type of domain and instance objects to secure and the actions that a user or group is authorized to perform against the object.
- Encryption: All connections to the Teracloud® Streams Console, the REST management API, and the data exchange API use the HTTPS protocol. Furthermore, you can encrypt PE to PE communication and management communication with TLS 1.3 or TLS 1.2. Most toolkits have operators that enable the sourcing and sinking of data using TLS 1.3 or TLS 1.2.
- Authentication: The default user authentication method is PAM or LDAP. For a basic domain, Teracloud® Streams uses PAM. For an enterprise domain, you can specify either LDAP or PAM as the default method when you create the domain, and then customize user authentication after the domain is created. You can also create JAAS plug-in modules and integrate with any back-end authentication system.
Ensuring integrity:
- Checkpointing: Operator state can be persisted at run-time to allow recovery from a failure. This enables you to design applications to guarantee delivery of data.
- Auditability: Streams supports comprehensive, multiple-level auditing of product and user operations.
Sustaining availability:
- Failover: There is a high availability count property in both domains and instances. This property indicates how many copies of management services are maintained by a domain or instance. If a leader service fails, the product automatically fails over to another instantiation of the service.
- Redundancy: The Streams product tightly integrates with redundant LDAP servers, Zookeeper quorums, and multiple Redis servers.