Network Security and Configurations

This article defines the security standards, network connectivity requirements, and access control guidelines for the askEdgi platform. The objective is to ensure secure deployment, operation, and integration of askEdgi across multiple deployment models while aligning with enterprise security, compliance, and audit expectations.

These guidelines provide transparency into how askEdgi protects sensitive metadata, controls platform access, encrypts communication, and enforces industry-standard security practices.

Scope

These security guidelines apply to all AskEdgi platform components including:

  • Java/Tomcat–based web application

  • Python backend microservices

  • Relational metadata databases (MySQL / PostgreSQL)

  • Elasticsearch search and indexing engine

  • Bridge server

  • Bridge client

  • Source system connectors and adapters

Supported deployment models include:

  • OvalEdge SaaS hosted on AWS

  • Customer-managed cloud deployments (AWS / Azure)

  • On-premise deployments on VMs, Kubernetes, or OpenShift

Assumptions

  • askEdgi is deployed inside customer-controlled VPC or data-center networks

  • Application access is allowed only via HTTPS

  • Integration with enterprise Identity Providers (AD, Okta, Entra ID) is supported

  • Databases and Elasticsearch are never publicly exposed

  • Network segmentation and firewall controls follow customer security standards

Identity, Access & Authentication

Authentication

askEdgi supports enterprise Single Sign-On (SSO) using:

  • SAML 2.0

  • OpenID Connect (OIDC)

Supported identity providers include:

  • Okta

  • Microsoft Entra ID (Azure AD)

  • Active Directory Federation Services (AD FS)

  • Other standards-compliant IdPs

SaaS Requirements

  • SSO mandatory for all named users

  • MFA must be enforced at IdP level

  • Shared accounts are not permitted

Local Users

Allowed only for:

  • Initial platform bootstrap

  • Emergency break-glass administration

Authentication Port:

  • 443 / HTTPS

Authorization

AskEdgi enforces Role-Based Access Control (RBAC).

Standard Roles

  • Data Consumer

  • Data Steward

  • Administrator

  • DevOps Administrator

  • Lineage Operations

Authorization Principles

  • Least privilege enforced

  • No direct DB or Elasticsearch access for business users

  • Admin access restricted to named individuals

  • All access actions are auditable

Credential & Secret Handling

Secrets are stored only in approved secret management systems:

  • AWS Secrets Manager

  • Azure Key Vault

  • HashiCorp Vault

Security Controls

  • No plaintext secrets in:

    • Property files

    • Source code

    • CI/CD pipelines

    • Kubernetes manifests

  • Secrets injected dynamically at runtime

  • Separate secrets per environment and tenant

Rotation Policy

  • Every 90 days, or

  • Immediately upon staff exit or security incident

Application Security Guidelines

Secure Configuration Baseline

  • Default and demo users disabled

  • Strong password policies enforced

  • Session timeout and idle logout enabled

  • Admin UI restricted by:

    • Corporate IP allowlists, or

    • Privileged admin groups

Application Hardening

  • HTTPS only (HTTP disabled)

  • TLS 1.2 or higher

  • Directory listing disabled

  • Unnecessary headers removed

  • Upload and request size limits enforced

  • API rate limiting via WAF

Internal Service Ports

Component
Port

Tomcat Application

8080

Python Services

8000

Bridge Server

9443

Elasticsearch

9200

All internal ports remain accessible only within private subnets.

Dependency & Patch Management

  • SBOM maintained for:

    • Java libraries

    • Python packages

    • OS dependencies

  • Critical vulnerabilities patched within SLA

  • Minor upgrades during scheduled maintenance

  • Supported versions documented for:

    • Java

    • Tomcat

    • Database

    • Elasticsearch

    • OS

Data Security

Data at Rest

  • Database and Elasticsearch encryption enabled

  • Encrypted backups and snapshots

  • Encryption via:

    • AWS KMS

    • Azure-managed keys

    • Customer-managed keys (optional)

  • Separate keys per environment recommended

Data in Transit

All communication uses TLS encryption.

Source
Destination
Port
Purpose

User Browser

AskEdgi UI

443

UI/API

Application

Database

3306

Metadata

Application

Elasticsearch

9200

Search

Bridge Client

Bridge Server

9443

mTLS

circle-info

Mutual TLS (mTLS) ensures both server and client authentication.

Data Masking & Logging

  • PII masking supported in:

    • Search

    • Profiling

    • Lineage

  • Logs never contain:

    • Passwords

    • Tokens

    • Secret

    • PII

Network & Perimeter Security

  • External access allowed only on 443

  • Protected by:

    • ALB / NLB + WAF (cloud)

    • Reverse proxy/firewall (on-prem)

  • No public access to:

    • Databases

    • Elasticsearch

    • Internal services

  • Private connectivity preferred:

    • VPN

    • VPC peering

    • Private endpoints

Logging, Monitoring & Incident Response

Logging

  • Centralized logging:

    • CloudWatch

    • Log Analytics

    • SIEM

  • Audit logs include:

    • Authentication

    • Authorization

    • Configuration changes

    • Lineage updates

Monitoring

  • CPU, memory, disk

  • API latency and errors

  • DB connections

  • Elasticsearch index growth

  • Bridge job execution

Incident Response

  • Severity levels: P1–P4

  • Escalation: Support → DevOps → Engineering

  • Includes isolation, RCA, and customer communication

Secure SDLC & Deployment

  • OWASP-aligned code reviews

  • Automated secrets scanning

  • Signed immutable Docker images

  • Environment promotion: Dev → QA → UAT → Production

  • Security testing:

    • SAST

    • DAST

    • Periodic penetration testing

Shared Responsibility Matrix

Customer Responsibilities

  • Network perimeter

  • Firewall and routing

  • Identity provider and MFA

  • Bridge client host security

OvalEdge Responsibilities

  • Application security

  • Platform patching

  • Vulnerability remediation

Shared Responsibilities

  • Database security

  • Backup & disaster recovery

  • Encryption key management

  • Vulnerability monitoring


Copyright © 2026, OvalEdge LLC, Peachtree Corners, GA USA

Last updated

Was this helpful?