The Nirmata team is vested in the establishment and maintenance of security best practices. Our security policies and architectures have been developed with consultation and from cloud provider partners, like Amazon Web Services, as well as security solution providers in the Cloud Native Computing Foundation (CNCF) ecosystem. Our philosophy is “secure by default” to ensure that security is not an afterthought but is built-in.
The Nirmata Cloud Edition offers a Software-as-a-Service (SaaS) delivery model, while the Nirmata Private Edition enables Nirmata to be downloaded and installed in your data center or cloud.
Both editions of the Nirmata solutions have the same security architecture. The only difference is whether Nirmata is managed by our global operations team, or by our customers operations team.
Nirmata is designed to have zero access or visibility to your application data. Nirmata is architected so that your applications can run on your secure servers in your Virtual Private Cloud (VPC) or Data Center (DC).
The Nirmata Host Agent is a secure static container that runs on each container host. The agent is single-homed to connect only to the Nirmata services (e.g. nirmata.io) using WebSocket Secure (WSS) protocol. The Nirmata agent is designed to adhere to CIS Benchmarks for container security, and the our Customer Success team has extensive experience with assisting your operations and security teams in establishing security best practices for building container hosts.
For Nirmata managed Kubernetes clusters, the Nirmata Kubernetes Controller uses the same secure access pattern as the Nirmata Host Agent.
The Nirmata Web Application, and other clients like the REST API and CLI, access Nirmata services using HTTP over SSL (HTTPS).
Nirmata encrypts all sensitive customer data, such as access tokens or passwords. Nirmata staff members do not have the ability to decrypt encrypted customer data.
All Nirmata inter-service communications are encrypted using SSL. Each Nirmata service has a unique identify managed by a X.509 certificate. Communication across services is authenticated using the public-private keys and HMAC (hash-based message authentication code) and access control permissions are applied.
The Nirmata Cloud Edition SaaS runs on secure Amazon Web Services (AWS) data centers that have achieved ISO 27001 certification, PCI DSS Level 1 compliance, and SAS70 Type II. As an AWS partner and an official solution provider to Amazon Web Services, Nirmata abides by AWS security best practices.
In addition to being built with a secure architecture, Nirmata also applies security best practices to Kubernetes clusters and workloads. The following is a list of the major security related features that Nirmata enables. For complete details please review the Nirmata customer documentation.
Nirmata integrates with your Active Directory Federation Services (ADFS) or any other SAML v2 Identity Provider (IdP) to enable Single Sign On (SSO) for users.
Nirmata allows requiring multi-factor authentication for securing access to the Nirmata Web Console.
Nirmata enables several security and operational best practices for Kubernetes.
Nirmata allows managing Kubernetes secrets via policies, so application definitions can be portable. In addition, Nirmata also has deep integrations with HashiCorp’s Vault for secrets management. Here is a video and presentation that will help you learn more about secrets management with Vault and Nirmata.
Nirmata provides roles and permissions for users. In addition to standard roles, Nirmata also allows administrators to allow or restrict access to objects like Environments and Applications.
Nirmata has deep integrations and partnerships with leading container security solutions like Aqua, Twistlock. To see a complete list of Nirmata ecosystem partners, you can visit our partner page.