Security
Last updated
Last updated
Security is paramount in any real-time event processing system, and Cortex is equipped with robust security controls to ensure your data and applications are protected with industry-standard practices. This section will guide you through the process of setting up Vaults and Certificates, key components in securing your Runners and sensitive credentials.
After you create and productionize your Applications on Runners; you can only change/edit security settings by stopping your Applications/Runners. As some expected interruption occurs; we suggest you to continue reading this section if you need to set security settings.
You'll learn about the intricacies of Creating and Managing Vaults in Cortex. Additionally, the process of enabling Vaults for Nodes will be covered, ensuring a secure and streamlined management of sensitive configurations.
You can Create Vaults to secure sensitive credentials by choosing different Encryption Algorithms.
Personal Encryption Keys plays a key role Vaults, Cortex implements a decrypt-and-forget approach to your Personal Encyrption Keys to ensure upmost confidentiality.
Two different levels of security are provided in Cortex. You can learn about Runner-level Vaults Application-level Vaults and implement as many as you require.
Anytime; you can Edit and Delete Vaults to be implemented into your Applications or Runners.
You'll also explore the implementation of Security Certificates that can be used in Applications. This section guides you through the process of uploading security certificates to enhance your environment's security.
You can upload Certificates that can be used in Source, Sink, Table, and Aggregation Nodes while creating Applications.
Navigate the Certificates page for effective management and information access.
Understand the critical role of Certificates in establishing secure connections and data encryption.
This section of the guide is dedicated to elaborating on all Vaults and Certificate Settings, their functionalities, and how they can be leveraged to create diverse and effective Applications. We begin with an overview of the Vaults and then continue to Certificates.