Security Aspect
Security Aspect contains security tools and subsystems that are used throughout the architecture.
The Security Aspect is used in every layer of the architecture. The aspect was developed such that all layers in the architecture has a common mechanism to perform common security use cases, such as, encryption, detection, remediation, and root of trust.
Because security spans all of the layers the aspect also coordinates the use cases across the layers.
Use Cases
The following are the use cases of the Security Aspect subsystem. Each use case has primary and secondary scenarios that are elaborated in the use case descriptions.
Users
The following are the actors of the Security Aspect subsystem. This can include people, other subsystems inside the solution and even external subsystems.
Interface
The subsystem has a REST, CLI, WebSocket, and Web interface. Use Cases and Scenarios can use any or all of the interfaces to perform the work that needs to be completed. The following diagram shows how users interact with the system.
Logical Artifacts
The Data Model for the Security Aspect subsystem shows how the different objects and classes of object interact and their structure.
Sub Packages
The Security Aspect subsystem has sub packages as well. These subsystems are logical components to better organize the architecture and make it easier to analyze, understand, design, and implement.
Classes
The following are the classes in the data model of the Security Aspect subsystem.
Deployment Architecture
This subsystem is deployed using micro-services as shown in the diagram below. The ‘micro’ module is used to implement the micro-services in the system. The subsystem also has an CLI, REST and Web Interface exposed through a nodejs application. The nodejs application will interface with the micro-services and can monitor and drive work-flows through the mesh of micro-services. The deployment of the subsystem is dependent on the environment it is deployed. This subsystem has the following environments:
Physical Architecture
The Security Aspect subsystem is physically laid out on a hybrid cloud infrastructure. Each microservice belongs to a secure micro-segmented network. All of the micro-services communicate to each other and the main app through a REST interface. A Command Line Interface (CLI), REST or Web User interface for the app is how other subsystems or actors interact. Requests are forwarded to micro-services through the REST interface of each micro-service. The subsystem has the a unique layout based on the environment the physical space. The following are the environments for this subsystems.
Micro-Services
These are the micro-services for the subsystem. The combination of the micro-services help implement the subsystem’s logic.
dev
Detail information for the dev environment can be found here
Services in the dev environment
- web : sa_web
test
Detail information for the test environment can be found here
Services in the test environment
- web : sa_web
prod
Detail information for the prod environment can be found here
Services in the prod environment
- web : sa_web
Activities and Flows
The Security Aspect subsystem provides the following activities and flows that help satisfy the use cases and scenarios of the subsystem.
Messages Sent
Event | Description | Emitter |
---|---|---|
policy.create | When an object of type Policy is created. | Policy |
policy.destroy | When an object of type Policy is destroyed. | Policy |
policy.updated | When an object of type Policy has an attribute or association updated. | Policy |
policycollection.create | When an object of type PolicyCollection is created. | PolicyCollection |
policycollection.destroy | When an object of type PolicyCollection is destroyed. | PolicyCollection |
policycollection.updated | When an object of type PolicyCollection has an attribute or association updated. | PolicyCollection |
Interface Details
The Security Aspect subsystem has a well defined interface. This interface can be accessed using a command line interface (CLI), REST interface, and Web user interface. This interface is how all other subsystems and actors can access the system.