Skip to content

Commit

Permalink
move security recommendations
Browse files Browse the repository at this point in the history
Signed-off-by: nikki everett <[email protected]>
  • Loading branch information
neverett committed Dec 17, 2024
1 parent d6d332c commit b8aafdb
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 19 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -47,10 +47,6 @@ The execution environment is managed by the customer:

Additionally, the Dagster+ agent is [open source and auditable](https://github.com/dagster-io/dagster-cloud)

Common security considerations in Dagster+ hybrid include:
- [disabling log forwarding](/todo)
- [managing tokens](/todo)

The following highlights are described in more detail below:

- [Interactions and queries](#interactions-and-queries)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -45,20 +45,10 @@ When a run needs to be launched, Dagster+ enqueues instructions for your agent t

Your agent will send Dagster+ metadata letting us know the run has been launched. Your run's container will also send Dagster+ metadata informing us of how the run is progressing. The Dagster+ backend services will monitor this stream of metadata to make additional orchestration decisions, monitor for failure, or send alerts.

## Security
## Best practices

Dagster+ hybrid relies on a shared security model.
### Security

The Dagster+ control plane is SOC 2 Type II certified and follows best practices such as:
- encrypting data at rest (AES 256) and in transit (TLS 1.2+)
- highly available, with disaster recovery and backup strategies
- only manages metadata such as pipeline names, execution status, and run duration

The execution environment is managed by the customer:
- your code never leaves your environment
- all connections to databases, file systems, and other resources are made from your environment
- the execution environment only requires egress access to Dagster+

Common security considerations in Dagster+ hybrid include:
- [disabling log forwarding](/todo)
- [managing tokens](/todo)
You can do the following to make your Dagster+ Hybrid deployment more secure:
- [Disable log forwarding](/todo)
- [Manage tokens](/todo)

0 comments on commit b8aafdb

Please sign in to comment.