Browse Source

Update netdata-security.md (#15067)

Chris Akritidis 1 year ago
parent
commit
90552f5a16
1 changed files with 12 additions and 12 deletions
  1. 12 12
      docs/netdata-security.md

+ 12 - 12
docs/netdata-security.md

@@ -213,29 +213,29 @@ By collecting this data, Netdata is able to continuously improve their service a
 
 Internal Security Measures at Netdata are designed with an emphasis on data privacy and protection. The measures include:
 
-1. **Infrastructure as Code (IaC)** \
+1. **Infrastructure as Code (IaC)** :
 Netdata Cloud follows the IaC model, which means it is a microservices environment that is completely isolated. All changes are managed through Terraform, an open-source IaC software tool that provides a consistent CLI workflow for managing cloud services.
-2. **TLS Termination and IAM Service** \
+2. **TLS Termination and IAM Service** :
 At the edge of Netdata Cloud, there is a TLS termination, which provides the decryption point for incoming TLS connections. Additionally, an Identity Access Management (IAM) service validates JWT tokens included in request cookies or denies access to them.
-3. **Session Identification** \
+3. **Session Identification** :
 Once inside the microservices environment, all requests are associated with session IDs that identify the user making the request. This approach provides additional layers of security and traceability.
-4. **Data Storage** \
+4. **Data Storage** :
 Data is stored in various NoSQL and SQL databases and message brokers. The entire environment is fully isolated, providing a secure space for data management.
-5. **Authentication** \
+5. **Authentication** :
 Netdata Cloud does not store credentials. It offers three types of authentication: GitHub Single Sign-On (SSO), Google SSO, and email validation.
-6. **DDoS Protection** \
+6. **DDoS Protection** :
 Netdata Cloud has multiple protection mechanisms against Distributed Denial of Service (DDoS) attacks, including rate-limiting and automated blacklisting.
-7. **Security-Focused Development Process** \
+7. **Security-Focused Development Process** :
 To ensure a secure environment, Netdata employs a security-focused development process. This includes the use of static code analysers to identify potential security vulnerabilities in the codebase.
-8. **High Security Standards** \
+8. **High Security Standards** :
 Netdata Cloud maintains high security standards and can provide additional customization on a per contract basis.
-9. **Employee Security Practices** \
+9. **Employee Security Practices** :
 Netdata ensures its employees follow security best practices, including role-based access, periodic access review, and multi-factor authentication. This helps to minimize the risk of unauthorized access to sensitive data.
-10. **Experienced Developers** \
+10. **Experienced Developers** :
 Netdata hires senior developers with vast experience in security-related matters. It enforces two code reviews for every Pull Request (PR), ensuring that any potential issues are identified and addressed promptly.
-11. **DevOps Methodologies** \
+11. **DevOps Methodologies** :
 Netdata's DevOps methodologies use the highest standards in access control in all places, utilizing the best practices available.
-12. **Risk-Based Security Program** \
+12. **Risk-Based Security Program** :
 Netdata has a risk-based security program that continually assesses and mitigates risks associated with data security. This program helps maintain a secure environment for user data.
 
 These security measures ensure that Netdata Cloud is a secure environment for users to monitor and troubleshoot their systems. The company remains committed to continuously improving its security practices to safeguard user data effectively.