Security Considerations
The initial configurations of TrustGraph have the following security characteristics:
| Boundary | Condition | Consideration |
|---|---|---|
| External access | It is necessary to consider the external access in the TrustGraph deployment:
| Ensure you understand whether TrustGraph services are exposed to the network outside of your host, and always verify you understand the network security controls applied by your cloud environment. |
| Service credentials | Services such as Cassandra and Pulsar are deployed without security credentials, relying on network isolation to prevent unauthorised access | For complex multi-tenant environments consider understanding the extra security features which are available in services |
| Gateway authentication | Out-of-the-box, there is no authentication on the API gateway | Consider setting `GATEWAY_TOKEN`, and using a token in API calls. Alternatively protect the gateway with a custom authentication gateway for external access. |
Enterprise Support
Enhanced security support for TrustGraph is available from KnowNext at https://knownext.io.