Security
Gluesync provides multiple layers of security to ensure your data remains protected throughout its journey from source to target systems.
Security Architecture Overview
Gluesync implements a multi-layered security approach:
-
Transport Layer Security (TLS): Secures all external communications
-
AES256 Encryption: Provides end-to-end data encryption
-
Node-to-Node Communication Security: Ensures secure inter-service messaging
-
Access Control: Manages user authentication and authorization
Transport Layer Security (TLS)
SSL/TLS Configuration
Gluesync uses Java KeyStore (JKS) files to manage TLS certificates. The following files are required for TLS configuration:
-
gluesync.com.jks
: The keystore file containing TLS certificate information -
security-config.json
: Configuration file for keystore access
Military-Grade Encryption (Enterprise Feature)
AES256 End-to-End Encryption
This feature requires a paid Gluesync Enterprise with Advanced Security license. |
Gluesync 2.0.6 introduces military-grade security with AES256 encryption:
-
End-to-End Data Protection: Data is encrypted from source through Core Hub to target systems
-
Intra-Service Communication: All node-to-node messages are encrypted
-
Zero-Knowledge Architecture: Ensures data privacy at all points
-
Customizable Encryption: Configure your own initialization vector and encryption key
Security Best Practices
General Recommendations
-
Certificate Management:
-
Regularly rotate TLS certificates
-
Use strong passwords for keystores
-
Keep certificate private keys secure
-
-
Encryption Configuration:
-
Change default encryption keys
-
Rotate encryption keys periodically
-
Store encryption keys securely
-
-
Network Security:
-
Use firewalls to restrict access
-
Implement network segmentation
-
Monitor network traffic
-
Production Deployment Security
For production environments:
-
Enable all security features:
-
TLS encryption
-
AES256 data encryption
-
Node-to-node communication encryption
-
-
Implement access controls:
-
Use strong authentication
-
Apply principle of least privilege
-
Regular security audits
-
-
Monitor security:
-
Enable security logging
-
Monitor access patterns
-
Set up alerts for security events
-