Setting Up Security Settings
Last updated
Last updated
Introduction Security is paramount in any real-time event processing system, and Cortex is equipped with robust security controls to ensure your data and applications are protected with industry-standard practices. This section will guide you through the process of setting up Vaults and Certificates, key components in securing your Runners and sensitive credentials.
Initiating Vault Creation: Secure your sensitive credentials by creating Vaults. Access the Vaults page and click 'Create Vault' at the top right. You'll need to choose an Encryption Algorithm, which is crucial for maintaining the confidentiality and integrity of your data.
Personal Encryption Keys: For each Vault, you'll enter a Personal Encryption Key. Cortex employs a decrypt-and-forget approach to these keys, enhancing confidentiality. It's vital to remember these keys, as lost keys mean encrypted information in the Vaults cannot be recovered, though it won't affect running applications.
Selecting Vault Type: Decide on the Vault Type based on where it will be utilized. Runner-level Vaults are designed for securing Runners with a single Truststore and Keystore credential. Application-level Vaults, however, are more versatile, securing an unlimited number of Key-Value Pairs for sensitive user input fields while configuring Nodes.
Utilizing Application-level Vaults: When configuring Nodes, select an Application-level Vault and enter its Personal Encryption Key to access the Key-Value Pairs. These pairs can be assigned to Vault-enabled user input fields, enhancing the security of each node configuration. You can add new Key-Value Pairs to the Vault as needed, ensuring your security measures evolve with your system.
Enabling Vaults for Nodes: A single Application-level Vault can be enabled for each Node, providing a streamlined and secure method to manage sensitive configurations.
Uploading Certificates: Enhance the security of your environment by uploading security Certificates. Navigate to the Certificates page and click the 'Upload Certificates' button on the top right. Here, you can manage and gain more information about each Certificate, ensuring you're fully informed about the security measures in place.
Certificates Management: Once uploaded, these Certificates play a critical role in establishing secure connections and encrypting data, providing you with peace of mind that your information is safeguarded against potential threats.
Emphasizing Security Best Practices Remember, as you implement these security controls, maintaining a record of your Personal Encryption Keys is crucial. The decrypt-and-forget nature of Cortex's security ensures high confidentiality, but it also means that without the keys, access to the encrypted information is permanently lost.
Next Steps With your security controls in place, you're now ready to move forward with confidence, knowing your Cortex environment is safeguarded with comprehensive, industry-standard security measures. The following sections of this guide will delve into more advanced features and best practices, helping you to fully leverage the power of Cortex in your real-time event processing endeavors.