Condense
Visit WebsiteRaise a Support TicketBook a Meeting
  • Overview
  • Introduction to Condense
    • What is Condense?
    • Features of Condense
    • Condense Architecture
      • Detailed Component Breakdown
      • Additional Services
      • Components and Services within the Kubernetes Cluster
    • Key Benefits of Condense
    • Why Condense?
    • Condense Use-Cases
    • FAQs
  • Fully Managed kafka
    • Kafka Management
    • Kafka Connect
    • Schema Registry
    • Securing Kafka
    • Kafka Administration
  • Security
  • Condense Deployment
    • Bring Your Own Cloud (BYOC)
      • Deployment from GCP Marketplace
      • Deployment from AWS Marketplace
      • Deployment from Azure Marketplace
  • Condense App - Getting Started
    • Glossary
    • Features of Condense App
    • Video Guide
    • SSO (Single Sign On) - Creating an Account/Logging into the Condense App
    • Workspace in Condense
    • Pre-Built Connectors
    • Custom Transforms
    • Applications
    • Pipelines
    • Settings
    • Role Based Access Control (RBAC)
    • Activity Auditor
    • Campaigns
    • Split Utility
    • Alert Utility
    • KSQL
  • Connectors in Condense
    • Available Connectors
    • Upcoming Connectors
  • Certifications
    • ISO 27001:2013
    • ISO 9001:2015
  • Legal
    • End User License Agreement (EULA)
    • Privacy Policy
    • Usage of Cookies
    • Terms and Conditions
  • Marketing Assets
    • Wallpapers
    • Social Media
Powered by GitBook
On this page
  • Data Residency
  • Read-Only Deployment
  • Secure Communication
  • API Authentication and Authorization
  • Data Encryption
  • Regular Security Updates
  • Vulnerability Scanning and Penetration Testing
  • Audit Logging

Was this helpful?

Security

PreviousKafka AdministrationNextCondense Deployment

Last updated 4 months ago

Was this helpful?

First Time User? Free Credits on us!

Get up to $200 worth of Free credits when you sign up for the first time. Use this link to create a new account on Condense and claim your free credits!

Condense prioritizes data security and access control to ensure user trust and compliance with data privacy regulations. Here's a closer look at the security measures employed:

Data Residency

Data sovereignty is a core principle of Condense. Data from various sources never leave the user's cloud environment, offering superior control and compliance. This feature is particularly valuable for large Enterprises handling sensitive data.

Read-Only Deployment

Condense is deployed with minimal permissions. It primarily focuses on network administration and utilizes a private Kubernetes cluster. This safeguards workloads from unauthorized access, accidental deletion, or tampering.

Secure Communication

Communication between Condense and the Zeliot Central Tower is secured using tokens generated with a unique client ID and secret. This ID and secret are provided to Condense during the initial deployment and remain unchanged throughout the Condense lifecycle.

API Authentication and Authorization

Condense utilizes a robust authentication and authorization mechanism for API access. Users are authenticated using credentials stored securely in the Postgres database. Role-based access control (RBAC) restricts user actions based on their assigned permissions, ensuring only authorized users can access specific functionalities.

Data Encryption

Data at rest and in transit is encrypted using industry-standard algorithms. This protects sensitive information even in the event of a security breach.

Regular Security Updates

Condense adheres to a rigorous security update schedule. The system automatically receives security patches and updates for its components to address vulnerabilities and maintain a secure environment.

Vulnerability Scanning and Penetration Testing

Condense undergoes regular vulnerability scanning and penetration testing to identify and address potential security weaknesses. This proactive approach minimizes the risk of exploitation by malicious actors.

Audit Logging

Condense maintains comprehensive audit logs that record user activity, system events, and configuration changes. These logs provide a valuable audit trail for security analysis and compliance purposes.

https://www.zeliot.in/try-now