-
Notifications
You must be signed in to change notification settings - Fork 0
Security_Considerations
Joe Winter edited this page Sep 4, 2014
·
1 revision
Deployment Guidelines : Security Considerations
Security Considerations
This section describes security considerations that should be observed when Doradus is used to store sensitive data. Details on configuring specific Doradus and Cassandra options, such as enabling TLS for the Doradus REST protocol, are described later in sections Doradus Security Options and Cassandra Security Options.
Within the Doradus architecture, application data is stored on disk and transferred across a network. Additionally, certain configuration files contain options such as passwords and must thereby be treated as sensitive. The following diagram illustrates the files and protocols (APIs) that have potential security considerations:
Figure 8 - Files and Protocols with Security Considerations