Skip to content

Security_Considerations

Joe Winter edited this page Sep 4, 2014 · 1 revision
Deployment Guidelines : Security Considerations

Security Considerations
This section describes security considerations that should be observed when Doradus is used to store sensitive data. Details on configuring specific Doradus and Cassandra options, such as enabling TLS for the Doradus REST protocol, are described later in sections Doradus Security Options and Cassandra Security Options.
Within the Doradus architecture, application data is stored on disk and transferred across a network. Additionally, certain configuration files contain options such as passwords and must thereby be treated as sensitive. The following diagram illustrates the files and protocols (APIs) that have potential security considerations:
Figure 8 - Files and Protocols with Security Considerations

Clone this wiki locally