Additional Security Information
Overview
- All services required by Cloudify run under the Cloudify user (and not root) in the manager VM. The only exception is the parent process of Nginx, which runs as root in order to enable the use of port 80. It is not recommended to change this behavior.
- A secrets store is implemented inside the Cloudify PostgreSQL database, which provides a tenant-wide variable store.
- Through the usage of the secrets store, a user can ensure all secrets (such as credentials to IaaS environments, passwords, and so on) are stored securely and separately from blueprints, and adhere to isolation requirements between different tenants.
- Users need not know the actual values of a secret parameter (such as a password), since they can just point to the secrets store.
- Secrets can be added to the store using a
SET
function and retrieved viaGET
. - Plugins can access the secrets store, to leverage the secrets when communicating with IaaS environments.
- Cloudify Manager instances must be secured via SSL to ensure secrets are not passed on an unencrypted communication channel.
- The use of PostgreSQL ensures that secrets are replicated across all Cloudify Manager instances within a cluster, as part of HA.
For more information about the secrets store, click here.