Access to your assets
Connector
This section provides a comprehensive guide to setting up and using the Connector connection, which enables Fluid Attacks to securely access your private resources for security testing. Architecture This section outlines the architecture of the ...
Egress
This section describes the high-level architecture of the Egress connection used by Fluid Attacks to access your resources to be tested, as well as its minimum requirements and limitations. This connection relies on dedicated Cloudflare egress IPs. ...
Cloud
Fluid Attacks can access your resources with a cloud connection. Security is achieved through robust encryption and strong authentication mechanisms, adhering to the high-security standards of modern connection protocols. This ensures confidence in ...
Summary of mechanisms used to access assets
Maintaining secure connectivity to your source code and systems is crucial for preventing unauthorized access, protecting sensitive data, and ensuring operational continuity. Fluid Attacks offers three distinct connectivity options to achieve this. ...
Types of authentication used
This section guides you through the different authentication methods available for Fluid Attacks to access your repositories: OAuth SSH HTTPS OAuth Available for Azure, Bitbucket, GitHub, and GitLab Using the OAuth protocol is advised, as it is more ...