SlideShare a Scribd company logo
1 of 3
Download to read offline
Anypoint Platform
Cloud Security &
Compliance
WHITEPAPER
1
Overview
Security is a top concern when evaluating cloud services, whether
it be physical, network, infrastructure, platform or data security.
MuleSoft’s Anypoint Platform is designed to be a secure platform
for our customers. The Anypoint Platform spans SOA, SaaS
Integration and APIs. This whitepaper covers the security and
compliance of MuleSoft’s cloud services, namely CloudHub and
API Manager.
MuleSoft’s approach to cloud security is two-pronged: (a) we do
not inspect, permanently store, or otherwise interact directly
with sensitive customer data; and (b) we provide a highly secure
environment in which customers can perform sensitive data
manipulations. MuleSoft’s dedicated security team follow industry
best practices, run internal security audits and maintain policies
that span operations, data security, passwords and credentials,
facilities and network security and secure connectivity.
MuleSoft ensures compliance with our security policies through
regular audits. All cloud services are SSAE 16 SOC 2 Type 1
certified and reports can be shared with customers upon request.
Operations
MuleSoft’s goal is to provide a secure platform where customers
can operate, while giving customers the freedom and confidence
to do so without our examination or intervention. In order to do
this, MuleSoft follows industry best practices for operational
processes to provide a secure environment for customers. These
include, but are not limited to:
Data Security
When the Anypoint Platform is run as a cloud service, MuleSoft
transmits data for customers, though we are data agnostic.
MuleSoft does not inspect, permanently store, or otherwise interact
directly with customer payload data. MuleSoft understands that
the data customers are transmitting should be treated carefully to
mitigate any security risks. To this end, customers maintain control
over their data, configuration and workers.
Customers may choose to temporarily store data on queues. Data
will be stored on queues a maximum of 24 hours. This data can be
optionally encrypted, providing added security.
MuleSoft may collect monitoring, analytics or log data from Mule
instances. A Mule instance here refers to both CloudHub workers
and Mule ESB cores, as both CloudHub and API Manager
have connectivity to Mule instances for monitoring. Customers
may initiate actions on Mule instances from the cloud. All
communication between MuleSoft’s cloud and Mule instances is
secured using SSL with client certificate authentication. This is
to prevent unauthorized parties from reading data and initiating
unauthorized actions.
CloudHub workers provide a secure facility for transmitting and
processing data by giving each application its own virtual machine.
This ensures complete isolation between tenants for payload
security and isolation from other tenants’ code.
Passwords and Credentials
All account passwords and credentials are stored in a non-
reversible secure format in the database. Data encryption as
a feature of the platform can also be enabled. Customers can
store credentials for their own services inside the Mule Credential
Vault. CloudHub customers can also use the Secure Environment
Variables feature to ensure that sensitive configuration, such
as passwords or keys, are stored in an encrypted form on our
servers.
Facilities & Network
Amazon is MuleSoft’s cloud provider and the Amazon Web Service
(AWS) cloud infrastructure has been architected to be one of the
most flexible and secure cloud computing environments available
today. AWS’s world-class, highly secure data centers utilize
state-of-the-art electronic surveillance and multi-factor access
control systems. Data centers are staffed 24x7 by trained security
guards, and access is authorized strictly on a least-privileged
basis. Environmental systems are designed to minimize the impact
of disruptions to operations. Multiple geographic regions and
availability zones allow you to remain resilient in the face of most
failure modes, including natural disasters or system failures.
Comprehensive security policies
Least privilege access
Secure virtual private cloud environments
Regular application and network penetration testing and
vulnerability scanning
Regular external reviews of our security program and audits of
adherence to security compliance standards
Logging and alerting of platform-level security events
Strong authentication for administrative sessions
Secure software development lifecycle (SLDC) methodology
and standards
Security incident response and disaster recovery procedures
Tight controls and restrictions on administrative rights
AWS has achieved ISO 27001 certification and has been validated
as a Level 1 service provider under the Payment Card Industry
(PCI) Data Security Standard (DSS). AWS undergoes annual SOC
1 audits and has been successfully evaluated at the Moderate
level for Federal government systems as well as DIACAP Level
2 for DoD systems. AWS infrastructure is in alignment with the
following SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II),
SOC2, PCI DSS Level 1, ISO 27001, and ITAR.
More detail on AWS security can be found here.
Secure Connectivity
MuleSoft’s platform includes support for secure protocols and
provides tools to build secure services on our platform. MuleSoft
recommends that customers use these protocols and tools to
secure their services to secure their business. These include, but
are not limited to:
	
CloudHub also provides built in security for communication from
the cloud to on-premises application, databases, and services
using the Virtual Private Cloud (VPC) offering. VPC enables
customers to connect to its corporate data centers (whether on-
premises or in other clouds) to CloudHub as if they were all part of
a single, private network through an IPsec or SSL based VPN.
Compliance with Local Laws
The Anypoint Platform provides customers with the opportunity to
configure their integrations to run in different regions of the world
so customers can be compliant with local regulations. When a
customer configures an integration to run in a specific region, data
is only transmitted and processed within that region. These regions
include the US, EU, Asia Pacific, and South America. For example,
CloudHub allows MuleSoft customers to transmit their customer’s
payload data in a manner consistent with the EU Data Protection
Directive by using CloudHub’s EU region.
Services which collect monitoring, analytical or log data, are not
region specific. Customers must ensure that the data logged
to these services is compliant with its local laws (e.g. does not
contain PII).
For more information, please see the documentation.
On-Premise Security
The Anypoint Platform can be deployed in the cloud (CloudHub)
or on-premise (Mule ESB). When the customer chooses to run
the Anypoint Platform on-premise, MuleSoft does not interact with
customers’ data at all. Customers configure and run the software
and handle all storing, processing and transmitting of data directly,
without interference from MuleSoft. As MuleSoft does not process,
store or transmit customer data, information security standards
are dictated by how the customer’s environment is managed. The
Anypoint Platform on-premise is a solid part of our customers’
secure and compliant environments.
More Information
MuleSoft is dedicated to ensuring that customers can meet
their security and compliance goals with our platform. For more
information or answers to questions about MuleSoft security and
compliance, please contact info@mulesoft.com.
2
SSL
PGP payload encryption/decryption
OAuth2
WS-Security
SAML

More Related Content

What's hot

Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaperrun_frictionless
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...EC-Council
 
ICTA Technology Meetup 03 - SOA Security
ICTA Technology Meetup 03 - SOA SecurityICTA Technology Meetup 03 - SOA Security
ICTA Technology Meetup 03 - SOA SecurityCrishantha Nanayakkara
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and UpdateCisco Canada
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014Ronny Stavem
 
Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation Mark Ginnebaugh
 
Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014Michael Miller
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems aswanthmrajeev112
 
How LepideAuditor Suite simplifies change auditing
How LepideAuditor Suite simplifies change auditingHow LepideAuditor Suite simplifies change auditing
How LepideAuditor Suite simplifies change auditingLepide USA Inc
 
NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c	NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c Protect724migration
 
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array NetworksVirtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks Array Networks
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Ken Brown's Resume.20160706
Ken Brown's Resume.20160706Ken Brown's Resume.20160706
Ken Brown's Resume.20160706Ken Brown
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAmazon Web Services
 

What's hot (19)

Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
UltraIB_datasheet
UltraIB_datasheetUltraIB_datasheet
UltraIB_datasheet
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
ICTA Technology Meetup 03 - SOA Security
ICTA Technology Meetup 03 - SOA SecurityICTA Technology Meetup 03 - SOA Security
ICTA Technology Meetup 03 - SOA Security
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation
 
Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014
 
Websphere - Introduction to ssl part ii
Websphere - Introduction to  ssl part iiWebsphere - Introduction to  ssl part ii
Websphere - Introduction to ssl part ii
 
Ras pro
Ras proRas pro
Ras pro
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
 
How LepideAuditor Suite simplifies change auditing
How LepideAuditor Suite simplifies change auditingHow LepideAuditor Suite simplifies change auditing
How LepideAuditor Suite simplifies change auditing
 
NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c	NetFlow Monitoring Standard Content Guide for ESM 6.5c
NetFlow Monitoring Standard Content Guide for ESM 6.5c
 
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array NetworksVirtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Ken Brown's Resume.20160706
Ken Brown's Resume.20160706Ken Brown's Resume.20160706
Ken Brown's Resume.20160706
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
 

Similar to Anypoint Platform Cloud Security & Compliance

Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureBrad Brown
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Mule anypoint enterprise security
Mule  anypoint enterprise securityMule  anypoint enterprise security
Mule anypoint enterprise securityD.Rajesh Kumar
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxdeanmtaylor1545
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
0011sas security whitepaper
0011sas security whitepaper0011sas security whitepaper
0011sas security whitepaperCMR WORLD TECH
 
Mulesoftmeetup Thiruvanathapuram #4
Mulesoftmeetup Thiruvanathapuram #4Mulesoftmeetup Thiruvanathapuram #4
Mulesoftmeetup Thiruvanathapuram #4Anurag Dwivedi
 
Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)D.Rajesh Kumar
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentCryptzone
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoringElasticsearch
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityBrian Kesecker
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Mule securing
Mule   securingMule   securing
Mule securingSindhu VL
 
Baltimore jan2019 mule4
Baltimore jan2019 mule4Baltimore jan2019 mule4
Baltimore jan2019 mule4ManjuKumara GH
 

Similar to Anypoint Platform Cloud Security & Compliance (20)

Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft Azure
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Mule anypoint enterprise security
Mule  anypoint enterprise securityMule  anypoint enterprise security
Mule anypoint enterprise security
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docx
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
0011sas security whitepaper
0011sas security whitepaper0011sas security whitepaper
0011sas security whitepaper
 
Mulesoftmeetup Thiruvanathapuram #4
Mulesoftmeetup Thiruvanathapuram #4Mulesoftmeetup Thiruvanathapuram #4
Mulesoftmeetup Thiruvanathapuram #4
 
Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoring
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Mule securing
Mule   securingMule   securing
Mule securing
 
Baltimore jan2019 mule4
Baltimore jan2019 mule4Baltimore jan2019 mule4
Baltimore jan2019 mule4
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Anypoint Platform Cloud Security & Compliance

  • 1. Anypoint Platform Cloud Security & Compliance WHITEPAPER
  • 2. 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security. MuleSoft’s Anypoint Platform is designed to be a secure platform for our customers. The Anypoint Platform spans SOA, SaaS Integration and APIs. This whitepaper covers the security and compliance of MuleSoft’s cloud services, namely CloudHub and API Manager. MuleSoft’s approach to cloud security is two-pronged: (a) we do not inspect, permanently store, or otherwise interact directly with sensitive customer data; and (b) we provide a highly secure environment in which customers can perform sensitive data manipulations. MuleSoft’s dedicated security team follow industry best practices, run internal security audits and maintain policies that span operations, data security, passwords and credentials, facilities and network security and secure connectivity. MuleSoft ensures compliance with our security policies through regular audits. All cloud services are SSAE 16 SOC 2 Type 1 certified and reports can be shared with customers upon request. Operations MuleSoft’s goal is to provide a secure platform where customers can operate, while giving customers the freedom and confidence to do so without our examination or intervention. In order to do this, MuleSoft follows industry best practices for operational processes to provide a secure environment for customers. These include, but are not limited to: Data Security When the Anypoint Platform is run as a cloud service, MuleSoft transmits data for customers, though we are data agnostic. MuleSoft does not inspect, permanently store, or otherwise interact directly with customer payload data. MuleSoft understands that the data customers are transmitting should be treated carefully to mitigate any security risks. To this end, customers maintain control over their data, configuration and workers. Customers may choose to temporarily store data on queues. Data will be stored on queues a maximum of 24 hours. This data can be optionally encrypted, providing added security. MuleSoft may collect monitoring, analytics or log data from Mule instances. A Mule instance here refers to both CloudHub workers and Mule ESB cores, as both CloudHub and API Manager have connectivity to Mule instances for monitoring. Customers may initiate actions on Mule instances from the cloud. All communication between MuleSoft’s cloud and Mule instances is secured using SSL with client certificate authentication. This is to prevent unauthorized parties from reading data and initiating unauthorized actions. CloudHub workers provide a secure facility for transmitting and processing data by giving each application its own virtual machine. This ensures complete isolation between tenants for payload security and isolation from other tenants’ code. Passwords and Credentials All account passwords and credentials are stored in a non- reversible secure format in the database. Data encryption as a feature of the platform can also be enabled. Customers can store credentials for their own services inside the Mule Credential Vault. CloudHub customers can also use the Secure Environment Variables feature to ensure that sensitive configuration, such as passwords or keys, are stored in an encrypted form on our servers. Facilities & Network Amazon is MuleSoft’s cloud provider and the Amazon Web Service (AWS) cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. AWS’s world-class, highly secure data centers utilize state-of-the-art electronic surveillance and multi-factor access control systems. Data centers are staffed 24x7 by trained security guards, and access is authorized strictly on a least-privileged basis. Environmental systems are designed to minimize the impact of disruptions to operations. Multiple geographic regions and availability zones allow you to remain resilient in the face of most failure modes, including natural disasters or system failures. Comprehensive security policies Least privilege access Secure virtual private cloud environments Regular application and network penetration testing and vulnerability scanning Regular external reviews of our security program and audits of adherence to security compliance standards Logging and alerting of platform-level security events Strong authentication for administrative sessions Secure software development lifecycle (SLDC) methodology and standards Security incident response and disaster recovery procedures Tight controls and restrictions on administrative rights
  • 3. AWS has achieved ISO 27001 certification and has been validated as a Level 1 service provider under the Payment Card Industry (PCI) Data Security Standard (DSS). AWS undergoes annual SOC 1 audits and has been successfully evaluated at the Moderate level for Federal government systems as well as DIACAP Level 2 for DoD systems. AWS infrastructure is in alignment with the following SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II), SOC2, PCI DSS Level 1, ISO 27001, and ITAR. More detail on AWS security can be found here. Secure Connectivity MuleSoft’s platform includes support for secure protocols and provides tools to build secure services on our platform. MuleSoft recommends that customers use these protocols and tools to secure their services to secure their business. These include, but are not limited to: CloudHub also provides built in security for communication from the cloud to on-premises application, databases, and services using the Virtual Private Cloud (VPC) offering. VPC enables customers to connect to its corporate data centers (whether on- premises or in other clouds) to CloudHub as if they were all part of a single, private network through an IPsec or SSL based VPN. Compliance with Local Laws The Anypoint Platform provides customers with the opportunity to configure their integrations to run in different regions of the world so customers can be compliant with local regulations. When a customer configures an integration to run in a specific region, data is only transmitted and processed within that region. These regions include the US, EU, Asia Pacific, and South America. For example, CloudHub allows MuleSoft customers to transmit their customer’s payload data in a manner consistent with the EU Data Protection Directive by using CloudHub’s EU region. Services which collect monitoring, analytical or log data, are not region specific. Customers must ensure that the data logged to these services is compliant with its local laws (e.g. does not contain PII). For more information, please see the documentation. On-Premise Security The Anypoint Platform can be deployed in the cloud (CloudHub) or on-premise (Mule ESB). When the customer chooses to run the Anypoint Platform on-premise, MuleSoft does not interact with customers’ data at all. Customers configure and run the software and handle all storing, processing and transmitting of data directly, without interference from MuleSoft. As MuleSoft does not process, store or transmit customer data, information security standards are dictated by how the customer’s environment is managed. The Anypoint Platform on-premise is a solid part of our customers’ secure and compliant environments. More Information MuleSoft is dedicated to ensuring that customers can meet their security and compliance goals with our platform. For more information or answers to questions about MuleSoft security and compliance, please contact info@mulesoft.com. 2 SSL PGP payload encryption/decryption OAuth2 WS-Security SAML