![]() For example, an active subscription of a Beneficiary to an “Asset Sharing” group of Operations, associated with an access policy permitting “Asset Integration” and “Asset Co-Design” actions to its subscribers, allows users of this Beneficiary with an active “Designer” position, to integrate any of the group’s Operations to processes they design, as well as to modify or extend the specifications of those operations, assuming they are in “Under Development” status. specifications) are controlled by Designers or Asset Managers, by organizing assets (of the same specification level) in groups, assigning to groups specific access policies, and managing users and beneficiaries subscriptions. nodes, beneficiaries, users, accessible apps, assigned processes etc) are restricted actions, requiring approval in order to be completed. Registering or updating Primordia entities (e.g. Access to platform’s services and core data repositories (entities & assets) is controlled by a powerful multi-level permissions management module, based on established relations among nodes, beneficiary origins (local or remote), user types, positons, exercised access profiles, roles, groups and information classification. The platform incorporates its own identity management module, which covers both local and remote users and organizes them by node and beneficiary, but it can also be integrated with any third party IDM platform available in the market. sensitive or private information), and may be applied in Model level, to specific record sets, to specific fields, based on specific conditions, to data created or accessible by specific users or beneficiaries etc). On the contrary, apps data encryption is configured by Designers or Asset Managers, depending on the type of data (e.g. Encryption is also enforced in database level for core Primordia Data (i.e. ![]() As a platform used to generate and interconnect distributed nodes, security has been embedded in all interactions, communications and transactions among nodes, to ensure that each and every node is protected against threats from the outside world, and that all transactions among interfaced nodes are secured, properly authorized and certified.Įncryption is by default applied whenever data are transferred between architecture layers and between interacting services within the same layer. As a low code platform, software security features are applied to all deployed apps and to every installation, regardless the type or size of the underlying infrastructure, and they are employed on top of any other security technology (hardware or software) of this infrastructure. Thus, security is tightly integrated in all layers and components of the platform’s architecture, and it is constantly upgraded and enhanced in every new release, following and adopting the latest standards, techniques and practices in the field of Information Security. From its conception, Primordia has been designed with core objective to strongly secure both the platform and the networked world it will generate. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |