Security

Security is paramount in any real-time event processing system, and Cortex is equipped with robust security controls to ensure your data and applications are protected with industry-standard practices. This section will guide you through the process of setting up Vaults and Certificates, key components in securing your Runners and sensitive credentials.

Vaults

You'll learn about the intricacies of Creating and Managing Vaults in Cortex. Additionally, the process of enabling Vaults for Nodes will be covered, ensuring a secure and streamlined management of sensitive configurations.

  • You can Create Vaults to secure sensitive credentials by choosing different Encryption Algorithms.

Certificates

You'll also explore the implementation of Security Certificates that can be used in Applications. This section guides you through the process of uploading security certificates to enhance your environment's security.

  • You can upload Certificates that can be used in Source, Sink, Table, and Aggregation Nodes while creating Applications.

  • Navigate the Certificates page for effective management and information access.

  • Understand the critical role of Certificates in establishing secure connections and data encryption.

This section of the guide is dedicated to elaborating on all Vaults and Certificate Settings, their functionalities, and how they can be leveraged to create diverse and effective Applications. We begin with an overview of the Vaults and then continue to Certificates.

Last updated