Source Systems

Most source systems need credentials for access. Exceptions to this would be ingesting public web content for example.

  • Credentials govern the access type Aiimi Insight Engine has to the source system.

  • For example, control if Aiimi Insight Engine has read-only or write access also.

  • Credentials will also govern what Aiimi Insight Engine is able to see. On a filesystem this will be which folders and files Aiimi Insight Engine has access to.

  • Aiimi Insight Engine requires read-only access to areas of the source system that you wish to ingest from.

Defence in depth

  • Example: The credentials for Aiimi Insight Engine only have read-only permission for Specific Items in a source. Any upstream compromise would not be able to remove content from the source system.

  • While Aiimi Insight Engine is secure, the principal of least privileges should always be applied. This defence approach makes it impossible for malicious attack vectors to remove or corrupt anything.

Encryption and audit

  • Aiimi Insight Engine stores encrypts credentials that are controlled in one place from the Control Hub. This simplifies administration and improves security.

  • Source system auditing can inspect what Aiimi Insight Engine is doing during its discovery and enrichment process.