Source System Security

Most source systems need credentials for access. Exceptions to this would be ingesting public web content for example.

Aiimi Insight Engine requires at least read-only access to any area of a source system that you want to ingest.

  • Credentials govern the access type Aiimi Insight Engine has to the source system.

    • For example, read-only or read and write access.

  • Credentials also govern what Aiimi Insight Engine is able to see. On a filesystem this controls what folders and files Aiimi Insight Engine has access to.

Defence in Depth

This is a strategy that uses multiple security measures to protect your organisation and its assets.

  • Example: The credentials for Aiimi Insight Engine only have read-only permission for Specific Items in a source. Any upstream compromise would not be able to remove content from the source system.

Encryption and audit

  • Aiimi Insight Engine stores encrypted credentials all controlled from the Control Hub. This simplifies administration and improves security.

  • Source system auditing can inspect what Aiimi Insight Engine is doing during its discovery and enrichment process.