Architect Academy - IDMC Security Overview
Architect Academy - IDMC Security Overview
Architect Academy - IDMC Security Overview
Intelligent Data
Management Cloud (IDMC)
• Introductions
• IDMC Architecture
• Security Considerations
• Q&A
ETL Developer Data Engineer Citizen Integrator Data Scientist Data Analyst Business Users
DISCOVER & ACCESS & CONNECT & CLEANSE & MASTER & GOVERN & SHARE &
UNDERSTAND INTEGRATE AUTOMATE TRUST RELATE PROTECT DEMOCRATIZE
DATA DATA API & APP DATA MDM & 360 GOVERNANCE & DATA
CATALOG INTEGRATION INTEGRATION QUALITY APPLICATIONS PRIVACY MARKETPLACE
Connectivity
Metadata System of Record
DATA SOURCES
Real-time /
SaaS Apps On-premises
Sources + Sources + Streaming
Mainframe Applications Databases IoT Machine Data Logs Sources
REST
UK1
(eu-west-2)
CAC1 EMC1
EMW1 (germany-west-central)
(ca-central-1) (eu-west-1)
USW1-2
(us-west-1)
USW1, USW3, USW5 USE2, USE4, USE6 APNE2
(us-west-2) (us-east-1) (japan-east)
USW1-1, USW3-1 APNE1
(west-US-2) (japan-east)
EMSE1
(uae-north)
APSE2
(south-east-asia)
APSE1
(ap-south-east-2)
APAUC1
(australia-central)
Multi-tenant
Metadata
Secure Agent
Group (TLS 1.2) Web Client
Design
Admin
Other SaaS Apps
Logic
Pushdown
User
ERP Cloud CRM Compute Cluster (optional)
HTTPS: 443
(Outbound)
On-Premises
On-Prem
IDMC
Services
Cloud Apps
HTTPS: 443
(Outbound)
Secure Agent
No Inbound
Firewall ports
Firewall
Metadata
(TLS 1.2)
Secure Agent
HTTPS: 443
(Outbound)
Metadata
• Ability to revoke keys: customer has the ability to
(TLS 1.2) revoke encryption keys in the event of a security event
Notice this does not Secure Agent or incident (halting Informatica from access to their
apply to MDM data
(which continues to use data stored on IDMC)
Informatica Managed
Firewall
Keys)
HTTPS: 443
(Outbound)
• Full control on data access: customer can control their
encryption keys in the event an external party compels
Informatica to surrender their data
17 © Informatica. Proprietary and Confidential.
Data Storage Overview
Logically separated (per tenant) • Depending on which services you use and how you
configure them, Data Repository will contain:
Encrypted (same as metadata repository)
- Master Data (in case of MDM/360 services)
IDMC - Partial Profiled Data (in case of Data Governance & Catalog,
Services
Data Marketplace or Data Quality services)
Express
Route/Direct
Connect
Secure Agent
ExpressRoute lets you create private connections DirectConnect lets you create private connections VPN/Private Links are point to point connections
between Azure datacenters and infrastructure that’s on between AWS datacenters and infrastructure that’s on between infrastructures that maybe on your premises
your premises or in a co-location environment your premises or in a co-location environment or in a co-location environment
Customer Tenant
EC2
Multi-tenant
Metadata
(TLS 1.2)
Direct Connect *
On-Premises
Design
Admin
Firewall
On-Prem
Web Client
Service2 - SSO-based
AES encryption (256 bit)
- Certificate-based
ServiceN
- Token-based
Multi-Factor Authentication
IDMC
POD
• You have to choose one only secure agent to store the connections information. This agent must ALWAYS be running and
accessible. This makes this secure agent a SPOF for your ORG
• Connection properties are stored in the following local SA directory (this cannot be shared location with other secure agents):
<Secure Agent installation directory>/apps/Data_Integration_Server/data
• Customers need to manage credentials data back up process. It is strongly recommended to conduct backups regularly to
prevent loss of data
• IDMC uses CBC (Cipher Block Chaining) mode 256 AES encryption to store the connections
• IDMC generates an encryption key to secure connection properties stored with a Secure Agent. You can use a randomly
generated password or you can enter a custom password as the basis for the encryption key
• Use a custom password when you want to update the encryption key periodically. You can change the custom password
when you want to update the encryption key
• Connection properties cannot be stored with the local Secure Agent for organizations subject to FedRAMP
28 © Informatica. Proprietary and Confidential.
Summary
IDMC Security Architecture Diagram
IDMC is built on microservices-based technology architecture and cloud native frameworks. The diagram below shows all major
components of the IDMC security domain and lays out the areas of metadata and data persistence and data movement
IDMC
Services Informatica managed
Cloud runtime / Serverless Business data Cloud Apps
(optional) (HTTPS)
Multi-tenant
ORG
Business data
(HTTPS + TLS1.2)
Service1
Front end
Service2
Business data
Data +
(HTTPS)
ServiceN
Metadata
AES encryption (256 bit)
(HTTPS HTTPS HTTPS: 443
+ TLS1.2) (Outbound)
SAML 2.0 Provider Customer managed Secure Agent
(Windows, Linux)
(optional) Firewall
HTTPS Onprem or Cloud hosted (IaaS)
Connector Encrypted Connections logs Proxy
Design & Log retrieval Access REST
Administration Data Preview HTTPS/SSH (optional) Clients
SFTP/TLS
User
Identify / Access Access
Business data
Customer Tenant (HTTPS)
On-Premises
Compute Cluster CDI-e
User Web Client (optional)
No Inbound Firewalls Two levels of Master Keys *Note - Network and Logically Separated per Tenant
Infrastructure related
Https SSL Long Polling Master Key Stored in AWS
capabilities have
Data and Metadata Encryption
KMS/Azure Key Vault customer dependencies