Summary of mechanisms used to access assets
Maintaining secure connectivity to your source code and systems is crucial for preventing unauthorized access, protecting sensitive data, and ensuring operational continuity. Fluid Attacks offers three distinct connectivity options to achieve this.
Cloud
Cloud connection provides a direct and secure bridge to your resources. This method offers a seamless and efficient way to interact with your assets through Fluid Attacks' platform. Moreover, it offers secure and reliable access while maintaining operational efficiency.
The following are some key benefits of cloud connection:
- Enhanced security: It employs robust security measures to protect your data during transmission and storage.
- Simplified access: It provides an easy way of managing connections and accessing resources.
-
High availability: It allows for reliable and consistent access to your assets.
Learn the details of this connection, such as high-level architecture, requirements, and limitations, on the Cloud page.
Fluid Attacks recommends using this method, as it is more secure and simple than the alternatives.
Egress
The Egress connection allows Fluid Attacks to access your resources using static public IP addresses that you can whitelist on your firewall. This method provides a controlled and secure connection by explicitly authorizing specific IP addresses.
The following are some key benefits of the Egress connection:
- Granular control: It enables precise control over network access by whitelisting specific IP addresses.
- Firewall compatibility: It works with existing firewall configurations for enhanced security.
Learn the details of this connection, such as high-level architecture, requirements, and limitations, on the Egress page.
Connector
Corresponding to Zero Trust Network Access (ZTNA), the Connector connection allows Fluid Attacks to access your resources by installing a pivot agent within your private network. This agent acts as a secure access point, enabling authorized connections without exposing your entire network.
The following are some key benefits of the Connector connection:
- Enhanced security: It implements zero trust principles, offering a more granular control over network access as compared to a VPN, which minimizes the risk of unauthorized access.
- Device security posture validation: It checks the user's endpoint for security flaws, such as need for patching.
- Enhanced monitoring: It uses traffic logs to record user/device activity and access, which is valuable information for security monitoring and auditing.
Learn the details of this connection, such as high-level architecture, requirements, installation steps, and limitations, on the Connector page.