2024 IDMC Security Architecture Whitepaper
2024 IDMC Security Architecture Whitepaper
White Paper
2024
Table of Contents
Shared Responsibility Model ............................................................................................................................................... 3
Sub-organizations ........................................................................................................................................ 8
Transport Layer Security ...................................................................................................................................................... 8
|1
Static Analysis Scans (SAST) ..................................................................................................................................... 13
Software Composition Analysis (SCA) ....................................................................................................................... 13
Dynamic Analysis Scans............................................................................................................................................. 13
Manual Penetration Testing........................................................................................................................................ 13
Platform Layer Security ...................................................................................................................................................... 13
|2
Shared Responsibility Model
In today's digital landscape, cloud technology has revolutionized the way we store, access, and
manage data. In this paradigm, the traditional boundaries of security have blurred, requiring a
collaborative effort between cloud service providers and valued customers. This shared
responsibility model is a fundamental principle that underpins the protection of customer data
and digital assets. As we explore Informatica’s security architecture, it is important to clarify the
role(s) of all stakeholders involved, including our customers, our host providers and Informatica
plays in fortifying the security of our cloud-based solutions.
Figure 1
|3
Security “Of” the Cloud
Our cloud hosted solution utilizes our cloud ecosystem partners, Amazon Web Services (AWS),
Microsoft Azure (Azure), Google Cloud Platform (GCP) and Oracle Cloud Infrastructure (OCI)
who bear the vital responsibility of ensuring the robustness and reliability of the cloud
infrastructure. As our infrastructure partner, Informatica inherits controls from our ecosystem
which includes physical and environmental security, redundancy of data centers, and high
availability of their cloud services.
Figure 2
1
Defense in depth is a security strategy that leverages multiple security measures to protect an
organization's assets. This ensures that if one line of defense is compromised, additional layers exist as a
backup to ensure that threats are stopped along the way.
|4
IDMC Architecture Components
IDMC is built on a microservices-based technology architecture and cloud native frameworks.
The following figure shows all major components of the IDMC security domain and highlights
the areas of metadata and data persistence and data movement.
IDMC Security Architecture Diagram
Figure 3
The IDMC solution contains services that both users and system account access. Services
include, but are not limited to, Data Integration, Application Integration, API Manager, Data
Quality, and Data Governance and Catalog. These services are built on microservices and multi-
tenant repositories on the back end with a common login page and user interface shell on the
front end. Users interact with IDMC via a web client through the HTTPS protocol for design time
activities.
The customer employee acting as an administrator for their tenant configures and manages the
security of the customer organization. Integration developers and business users use the web-
based visual designer and wizard tools of IDMC to design integration and data management
flows. The metadata that defines these designs is stored in a multi-tenant metadata repository
in the IDMC solution. Unique tenant IDs and tenant specific encryption keys are used to ensure
separation of the metadata across tenants. The multi-tenant data repository backend is used for
securely storing customer metadata on the IDMC solution.2
2
The majority of IDMC services only store metadata in the customer’s tenant. Cloud Integration Hub
customers can choose to store data in their IDMC tenant but is only done at customer request. By default,
customers host their own databases. MDM customer data is stored in the customer’s tenant and is
protected by the same safeguards described in this document.
|5
The Informatica runtime environments (Secure Agent, Elastic Cluster, and Serverless) execute
customer-authored integrations and processes. They connect, transform, and move the data
between source and target data applications in batch, real time, and streaming integration
patterns. Customer-managed runtime environments (Secure Agent, Elastic, and Serverless) can
be deployed within the customer security context, whether it is in an on-premises environment
or the customer’s cloud VPC3 4. The Informatica-managed cloud runtime is deployed on the
IDMC solution.
Authentication
IDMC supports the following authentication mechanisms: password-based, SSO-based,
certificate-based, and token-based authentication. Multi-factor authentication mechanisms,
such as trusted IP address ranges, also enable rigorous user authentication.
For native password-based authentication, user credentials are hashed and securely stored in
the IDMC solution. Administrators of the customer organization can configure policies for
password strength and rotation to suit their business needs.
IDMC supports web SSO-based SAML 2.0 providers, which includes support for technologies
such as Okta, Azure AD, ADFS or any 3rd party IDP provider that supports SAML protocol for
authentication and authorization. Additionally, IDMC also supports service-to-service
authentication using short lived token-based authentication (OAuth 2.0). This allows customers
to configure service account specific job configuration.
Access Provisioning
The IDMC org, sub-org, project, and folder constructs enable the customer’s administrators to
effectively secure and govern the structure of their IDMC artifacts and intellectual property.
Access to projects and folders can be controlled by permissions to ensure separation of work
and to ensure authorized access only.
IDMC supports fine-grained access management at the asset type level and at every asset level.
Access to asset types is managed through privileges at the administrator level, and access to
asset levels is managed through permissions at the asset level. Access is enabled at both org
and sub-orgs. The org and sub-org administrators can also manage the user, user role, or user
group that can access asset types in IDMC. For example, an administrator can configure create,
3
While our whitepaper cites Virtual Private Cloud (VPC) which is an Amazon Web Services term, IDMC is
a cloud agnostic solution.
4
Secure Agent runtimes can be deployed in customer on-premises or cloud VPC environments. Elastic
and Serverless runtimes can be deployed in supported customer cloud VPC environments.
|6
read, update, delete, run, and set permissions for a user ID, user role, and/or user group for all
the Mapping tasks in IDMC.
Similarly at each asset level in IDMC, permissions can be set to manage read, update, delete,
execute, and change access for users, user roles, and user groups. IDMC additionally supports
SCIM protocol for users auto-provisioning in a sub-org via Okta and Azure AD.
Figure 4
Role privileges grant users access to asset types. Access control lists (ACL) in conjunction with
RBAC, allow organizations to control permissions at the asset level in IDMC.
|7
Sub-organizations
Administrators can create sub-organizations to easily classify and group users (very common to
segment users according to their line-of-business). Segregating users in this way allows
different departments (or other logical grouping of users) to see only their relevant work. The
administrator can also assign licenses for each organization and sub-organization and can
create delegated administrators. Privilege levels are configured to allow only specified users to
exercise administrator-like functions without giving them full administrative control.
The figure below illustrates the Informatica “delegated admin” function. The example shows the
parent organization defining policies for the environment, including authentication options,
licenses, logging options, job execution compute, and content distribution options. The
delegated admins can then be created and given control over each of their subordinate
organizations, creating any additional policies they deem necessary as long as the policies do
not conflict with the core policies configured by the parent administrator.
The delegated admin function easily enables customers to extend integration services to
downstream enterprise users. Additionally, this helps to promote reuse and best practices
across departments through Integration Competency Center (ICC) initiatives.
Figure 5
|8
The Secure Agent initiates communication with Informatica’s Intelligent Data Management
Cloud through a secure channel initially authenticated through a shared secret credential. No
inbound firewall ports need to be opened at the customer site for their Secure Agent to
communicate with the IDMC solution. The Secure Agent code communicates with the host and
uses port 443 for all outbound communication, including via proxy. The Secure Agent avoids
data loss and transport delays by checking for availability before connecting. The Secure Agent
also performs network resiliency checks and retains full audit and session logs for configurable
duration to support troubleshooting and audits. Additionally, logs can be sent to a customer’s
centralized logging systems to comply with security and regulatory requirements.
|9
User access controls are closely tied to metadata that details user actions within the system.
Role-based controls grant users access to the metadata and specific functions. All IDMC
services adhere to contractual obligations for the retention and disposition of the above
metadata. See https://www.informatica.com/legal.html for further information.
5
This does not include customer data stored within the MDM solution. For information about the MDM
purposes, refer to Security and Compliance Overview: Customer 360.
| 10
Secrets Manager Configuration Service
Users are also allowed option of credential storage within the customers enterprise Secrets
Manager (or Vault). Customers have the ability to configure this if they prefer a centralized
storage and management mechanism (rotation) for all of their credentials. This is a flexible
option which customers can utilize this on a per connection basis. The current supported Secret
Managers are documented in our IDMC Product Availability Matrix6.
6
IDMC’s Product Availability Matrix (PAM) can be found at https://docs.informatica.com/integration-
cloud/data-integration/current-version/introduction/informatica-resources/informatica-product-
availability-matrices.html
7
Data Preview data is cached in memory for the session of the user. The data is not stored on disk and is
immediately deleted on termination of the session.
| 11
Informatica’s production applications and infrastructure that could threaten stability, resiliency,
security, regulatory compliance, and availability. These procedures are applicable to the entire
workforce at Informatica and pertain to any modifications made in production environments.
These environments predominantly consist of hardware, system software, application software,
communication equipment, as well as all documentation and procedures related to the
operation and maintenance of these systems.
These secure coding procedures are defined around the following OWASP recommended
controls:
• Input Validation • Output Encoding
• Authentication and Password Management • Session Management
• Access Control • Cryptographic Practices
• Error Handling and Logging • Data Protection
• Communication Security • Data Security
• File Management • Memory Management
Informatica enforces secure coding procedures as part of our policies and procedures which
are part of Informatica’s mandatory security awareness training for all applicable personnel and
role-specific security training for our R&D organization.
| 12
Static Analysis Scans (SAST)
Informatica secures propriety code through the integration of an industry leading SAST solution
into our SDLC process. This integration ensures regular security gate checks, identifies security
vulnerabilities, maintains a risk driven inventory of all identified security vulnerabilities, and
alerts all key stakeholders of those vulnerabilities. Additionally, this allows for continuous
learning and improvement. The detected vulnerabilities are governed through our vulnerability
management process.
| 13
Figure 6
8
For more information about IDMC IP addresses, see
https://knowledge.informatica.com/s/article/524982.
| 14
The binaries sent to the customer’s Secure Agent are signed and hashed, preventing man-in-the-
middle attacks.
Communication Protocol
The communication between the customer-managed Secure Agent and IDMC is initiated by the
Secure Agent (located within the customer environment). The Secure Agent continuously
communicates with IDMC. There are two types of communication:
1. System Communication – This type of communication occurs between IDMC and the
Secure Agent and is always on-going. This communication is used to establish
connection between IDMC and the Secure Agent to determine the health of the Secure
Agent, to send runtime execution instructions to the Secure Agent, to monitor the
progress of a job, as well as to perform lifecycle management activities like connector
package updates and Secure Agent upgrades.
9
Steps to configure Secure Agent Fingerprint can be found at the following Knowledge article –
Fingerprint Authentication Properties.
10
For information about upcoming IDMC releases and upgrade schedules, please visit
https://status.informatica.com.
| 15
Figure 7
IP Allow Lists
IDMC Administrators can configure specific IP ranges authorization to access their org. By
defining specific IP addresses that are granted access, customers create a virtual perimeter
against unauthorized entry and potential threats. This approach significantly reduces the attack
surface, minimizing the risk of malicious actors.
| 16
PrivateLink Connection (AWS and Azure)
Informatica supports AWS and Azure PrivateLink. This provides private connectivity between
customer managed Secure Agents deployed in their AWS or Azure Virtual Private Cloud (VPC)
and the Informatica Cloud without exposing their traffic to the public internet11.
Figure 8
Decentralized Development
Microservices have segregated development teams for which access is managed with least
privilege. The overall build is centralized by a non-development operations team. This allows
Informatica to secure deployment ensuring no single set of developers have access to full
release.
11
Requires the respective IDMC org to be deployed on an IDMC POD running on AWS or Azure
infrastructure. Each cloud provider may vary with additional requirements to utilize PrivateLink and can be
found respectively here: AWS PrivateLink Requirements ; Azure PrivateLink Requirements.
| 17
scheduled maintenance windows. In case of urgent or zero-day vulnerabilities, the Operations
and QA teams coordinate to ensure available patches can be expedited and applied. Visit
https://www.informatica.com/legal.html for more information about vulnerability management
and SLAs.
Global Footprint
Informatica cloud data centers are available globally providing our customers a choice for their
provisioned IDMC Orgs, often required when the customer is subject to data residency
regulations. Informatica provides points-of-delivery (PODs)14 in North America (US West, US
East, Canada), EMEA (Ireland, Germany, UK, UAE and France) and APJ (Australia, Singapore, and
Japan).
12
See https://knowledge.informatica.com/s/article/524982 for required information about configuring
firewalls for DR PODs.
13
See the Security Addendum listed on https://www.informatica.com/legal.html for information about
RTO and RPO periods.
14
Informatica’s Point of Delivery (POD’s) cloud data centers are across the four major cloud providers
AWS, Azure, Google Cloud and Oracle. More details of these PODs can be found at
https://docs.informatica.com/cloud-common-services/pod-availability-and-networking/current-
version.html.
| 18
1. Maintain a safe, secure, and compliant ecosystem for customer data.
2. Provide Informatica and customers a trustworthy environment to conduct business.
3. Consistently maintain applicable security controls, certifications, and regulatory
compliance.
The security program focuses efforts and resources across the following areas:
Informatica has adopted specific security framework elements, processes and controls derived
from known industry standards such as the National Institute of Standards and Technology
(NIST) and the International Organization for Standardization (ISO) that are applicable to the
types of data processed and stored by Company, the industry and regulatory environment in
which Company participates, and the geographic locations in which the Company conducts
business.
SOC1 Type II
These reports are designed to meet the needs of users who need assurance about the controls
at a service organization relevant to financial controls, operations, and IT and business
processes that are tied to their financial reporting. These reports are intended to be used by
Customers’ external auditors.
| 19
UK Cyber Essentials (Scoped to systems and personnel within the United
Kingdom)
The Cyber Essentials Assessment is a set of baseline technical controls produced by the UK
Government and industry to help organizations, large and small, public, and private, improve
their defenses and publicly demonstrate their commitment to cybersecurity.
Informatica's software can be used in industries that are subject to GXP regulations, such as the
pharmaceutical and healthcare industries, but it is not itself subject to GXP regulations.
Informatica develops solutions that are designed to help its customers comply with GXP
regulations. For example, Informatica's MDM SaaS solution includes features that support data
validation, data quality monitoring, and audit trail creation and management, which are all
critical components of GXP compliance.
Informatica also provides documentation and guidance to its customers on how to configure
and use its products in a way that complies with GXP regulations. (Scoped to MDM SaaS
products)
Informatica classifies data per our data classification policy and consistently applies
protections per that classification; observes privacy principles such as transparency, purpose
limitation, and data minimization; honors the rights of data subjects, complies with data
localization and transfer requirements; analyzes, determines lawful basis for, and records
processing activities; and negotiates and honors contractual and statutory obligations with
respect to both vendors processing data on our behalf and customers on whose behalf we
process data.
| 20
Worldwide Headquarters 2100 Seaport Blvd., Redwood City, CA 94063, USA Phone: 650.385.5000, Toll-free in the US: 1.800.653.3871
IN09_1217_3407 www.informatica.com linkedin.com/company/informatica twitter.com/Informatica
© Copyright Informatica LLC 2023. A current list of Informatica trademarks is available on the web at
https://www.informatica.com/trademarks.html.
The information in this documentation is subject to change without notice. If you find any problems in this documentation, please report
them to us in writing at Informatica LLC 2100 Seaport Blvd. Redwood City, CA 94063.
INFORMATICA LLC PROVIDES THE INFORMATION IN THIS DOCUMENT "AS IS.” WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION
OF NON-INFRINGEMENT.
REVISION Q4 2023