Source System Security

Most source systems need credentials for access. Exceptions to this would be ingesting public web content for example.

Aiimi Insight Engine requires at least read-only access to any area of a source system that you want to ingest.

  • Credentials govern the access type Aiimi Insight Engine has to the source system.

    • For example, read-only or read and write access.

  • Credentials also govern what Aiimi Insight Engine is able to see. On a filesystem this controls what folders and files Aiimi Insight Engine has access to.

Defence in Depth

This is a strategy that uses multiple security measures to protect your organisation and its assets.

  • Example: The credentials for Aiimi Insight Engine only have read-only permission for Specific Items in a source. Any upstream compromise would not be able to remove content from the source system.

While Aiimi Insight Engine is secure, the principal of least privileges should always be applied. This defence approach makes it impossible for malicious attack vectors to remove or corrupt anything.

Encryption and audit

  • Aiimi Insight Engine stores encrypted credentials all controlled from the Control Hub. This simplifies administration and improves security.

  • Source system auditing can inspect what Aiimi Insight Engine is doing during its discovery and enrichment process.

Last updated