Access to your assets
Connector
This section reviews the Connector connection used by Fluid Attacks to access the private resources required to provide our service. Architecture Here you will find the high-level architecture for the Connector connection used by Fluid Attacks as ...
Egress
This section describes the high-level architecture for the Egress connection used by Fluid Attacks, as well as its minimum requirements and limitations. This solution relies on Cloudflare Dedicated Egress. High-level architecture We use public Egress ...
Cloud
Security in the cloud connection is guaranteed through the use of encryption and strong authentication, aligning it with the high-security standards provided by the different connection protocols, thus ensuring that the interaction with the cloud ...
Summary of mechanisms used to access assets
We understand that maintaining secure connectivity to our customer's source code and systems is essential to prevent unauthorized access, protect sensitive data, and maintain operational continuity. At Fluid Attacks, we offer three types of ...
Types of authentication used
In this section you will be guided through different authentication methods you have to gain certain access to our resources. You can do it through the following three protocols: OAuth SSH HTTPS OAuth OAuth (Open Authorization) is an authorization ...