Skip to content

Commit

Permalink
security architecture
Browse files Browse the repository at this point in the history
  • Loading branch information
dasunhegoda committed Nov 24, 2023
1 parent 893f6de commit a803126
Show file tree
Hide file tree
Showing 5 changed files with 56 additions and 5 deletions.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
1 change: 1 addition & 0 deletions docs/explanation/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@ hidden: true
---
user_mgt
security_archi
```
49 changes: 49 additions & 0 deletions docs/explanation/security_archi.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
# Security Architecture

![](images/security_architecture.jpg)

The OpenSPP platform can operate in a cloud environment as well as an on-prem environment while ensuring security and management across several key security domains, as listed below,

1. Identity and Access Management (IAM): This involves managing user identities and controlling access to resources within the platform to prevent unauthorized access.

2. API Security: This domain focuses on securing APIs to ensure that interaction between different software applications remains secure.

3. Backups/Disaster Recovery: This area is dedicated to securing data by creating backups and planning for quick recovery in case of a disaster.

4. Physical Security: Measures are in place to protect the platform’s physical assets, including hardware and facilities.

5. Secure Communication: The platform enforces secure communication protocols to protect data in transit.

6. Application Security: This pertains to measures and protocols that are designed to protect the platform's applications from threats and vulnerabilities.

7. Database Security: Ensures the protection of databases against compromises of their integrity, confidentiality, and availability.

8. Network Security: Involves protecting the integrity and usability of network and data, both on-site and off-site.

9. Perimeter Security: A defense mechanism for the outermost boundaries of the platform to detect and prevent attacks.

10. Audit Logs: Keeping detailed logs to track user activities that can be reviewed during security audits.

11. Security Information and Event Management (SIEM) Adaptor: This adoptor feeds data into the SIEM.

12. Infrastructure Security: Measures to protect the platform’s infrastructure, including systems, networks, and data centers.

13. SOC/NOC: Continuous observation of the platform's systems and networks to quickly identify and address potential security issues.

14. User Education and Awareness Training: Equipping users with the knowledge and skills to protect the platform and its data.

15. Key Management: Handling cryptographic keys within a cryptosystem, including their generation, exchange, storage, use, destruction, and replacement.

16. Data Loss Prevention (DLP): Strategies to prevent sensitive data from being accessed, used, or disclosed by unauthorized users.

17. Policy/Process Procedure: Establishing and maintaining policies and procedures that govern the operation and use of the platform.

18. Risk Management & Compliance: Identifying, assessing, and controlling threats to the platform's operations.

19. Incident Response and Recovery: A dedicated framework for addressing security breaches effectively, ensuring swift action and restoration of normal operations following an incident.

20. Red Teaming: This critical security practice involves challenging the platform’s defenses by simulating sophisticated cyber-attacks, ensuring vulnerabilities are identified and mitigated proactively.

Each domain is interconnected and plays a crucial role in maintaining the integrity and resilience of the OpenSPP platform. At the foundational layer, these security domains are influenced by the specific country's context. The implementation of security measures varies, with some being fully realized and others partially, all driven by the unique requirements of each country.

The above can be taken as a framework for the implementer to understand the holistic picture but OpenSPP zeroes in on the product-centric aspects, catering to the immediate needs and applications of its users.
5 changes: 4 additions & 1 deletion docs/technical_reference/backup.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,19 +12,22 @@ The key advantages are:
In the implementation of OpenSPP, the backup can be implemented at different layers

1. Infrastructure Layer

This layer focuses on the physical and virtual components of an IT environment, including servers, network equipment, and storage systems.

- Backup Methods: Full system backups, snapshots, and replication.
- Challenges: Managing the sheer volume of data and ensuring minimal impact on performance during backup operations.

2. Application Layer

The application layer encompasses the specific data and configurations of OpenSPP.

- Backup Considerations: It's important to capture application states and configurations, ensuring applications can be restored to a specific point in time.
- Challenges: Countries often have unique backup requirements and may require specialized tools.

3. Database Layer
Involves protecting the data stored in databases.

This layer Involves protecting the data stored in databases.

- Backup Techniques: Includes consistent backups, log backups, and hot/cold backups.
- Challenges: Ensuring data consistency and managing the recovery of large databases without impacting performance.
Expand Down
6 changes: 2 additions & 4 deletions docs/technical_reference/security.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,6 @@
# Trust & Security
# Security Implementations & Practices

## Security Architecture & Practices

This page delves into the security architecture and practices of OpenSPP, highlighting its adherence to the principles of zero-trust architecture, user authentication, input/output validation, session management, cryptographic management, file management, and robust logging.
This page delves into the implementation and practices of OpenSPP, highlighting its adherence to the principles of zero-trust architecture, user authentication, input/output validation, session management, cryptographic management, file management, and robust logging.

OpenSPP has been designed around the zero-trust architecture principle. This principle involves the fundamental premise of not automatically trusting anything inside or outside its perimeters. Instead, it verifies everything trying to connect to its systems before granting access. This approach fortifies OpenSPP's security framework, protecting it from both internal and external threats.

Expand Down

0 comments on commit a803126

Please sign in to comment.