DataFlow security
As a security administrator, understand the out-of-the box security features as well as the tasks that you need to perform to authorize CDP users.
CDP provides the following security features:
- User authentication
- Role-based user authorization
- Data encryption
User authentication
Users are automatically authenticated through the CDP identity provider. For more information, see CDP Security Overview.
Role-based user authorization
DataFlow roles allow you to set user permissions. Through these permissions you can define actions a user or group is allowed to perform and you can also scope the resources a they can perform those actions on.
For more information on the DataFlow roles, see DataFlow Authorization.
Data encryption
CDP encrypts data at rest and in motion.
- Data at rest
- When you import a flow definition, the flow definition is encrypted and stored in the DataFlow Catalog. DataFlow Catalog is a service that enables you to manage flow definitions centrally.
- Data in transit
- When you deploy a flow, the encrypted flow definition is transferred to your cloud account where it is decrypted and deployed. During a flow deployment, data can be transferred between servers, systems, applications, and users. Every transfer is a secure and trusted exchange through TLS. Through cryptographic protocols, TLS encrypts and authenticates: