Source System Security
Most source systems require credentials for access. An exception to this would be ingesting public web content.
Credentials govern the access type Aiimi Insight Engine has to a source system. Credentials also govern what Aiimi Insight Engine is able to see. On a filesystem this controls what folders and files Aiimi Insight Engine has access to.
Defence in Depth
This is a strategy that uses multiple security measures to protect your organisation and its assets.
Example: The credentials for Aiimi Insight Engine have read-only permission for Specific Items in a source. Any upstream compromise would not be able to remove content from the source system.
While Aiimi Insight Engine is secure, the principal of least privileges should always be applied. This defence approach makes it impossible for malicious attack vectors to remove or corrupt anything.
Encryption and audit
Aiimi Insight Engine stores encrypted credentials all managed in the Control Hub. This simplifies administration and improves security.
Source system auditing can inspect what Aiimi Insight Engine is doing during the discovery and enrichment process.
Last updated