Details
Description
Encryption in transit over protected networks and encryption at rest is becoming increasingly demanded by LN customers, particularly for Roxie environments. While we can possibly solve encryption at rest by resorting to block or filesystems encryption (such as LUKS), options for network traffic encryption are less seamlessly integrated. The traditional approach of considering HPCC as a single unit that protected by a hard shell envelope is no longer viable.
Attachments
Issue Links
- relates to
-
HPCC-9297 Utilize AES256 to provide content encryption services through ECL
-
- Accepted
-
-
HPCC-9323 Support for encryption key servers and key rotation
-
- Accepted
-
-
HPCC-10024 Encrypt network traffic between all MP clients and Thor sort sockets
-
- Resolved
-
-
HPCC-10002 Investigate how to create a SSH connection between clients and Dali
-
- Resolved
-
1.
|
Support for encryption key servers and key rotation |
|
Accepted | Unassigned |
2.
|
Utilize AES256 to provide content encryption services through ECL |
|
Accepted | Unassigned |
3.
|
Encryption in transit for Roxie |
|
Resolved | Richard Chapman |
4.
|
Encryption at rest for roxie |
|
Resolved | Mark Kelly |
5.
|
Encryption in transit for thor |
|
Resolved | Mark Kelly |
6.
|
Encryption at rest for thor |
|
Resolved | Mark Kelly |
7.
|
SSL encryption of the sending of a query to Roxie batch |
|
Resolved | Mark Kelly |
8.
|
Configmgr updates for new Roxie farmer ssl config |
|
Resolved | Kenneth A Rowland |