White Papers: White Paper: CTERA Security Architecture
Integrating security into an enterprise-wide cloud-based file services platform.
Built around a hub-and-spoke centralized security authority, CTERA’s Zero Trust architecture ensures that edge devices communicate solely with core servers and never possess credentials to access the object storage. Unlike other solutions CTERA gives you 100% control over your environment, with nothing hosted externally—ensuring complete data sovereignty and security.
Devices never possess access keys for object storage. Instead, every data access request is first submitted to a core server, which digitally signs approved requests. These are then used by the endpoint to interact directly with the object storage.
Prevent unauthorized access and reduce data breach risks by verifying every access request and continuously monitoring user activity.
Limit lateral movement and contain threats within the network using micro-segmentation.
Continuous monitoring and real-time analytics give you a clear view of what’s happening in your network at all times.
As your global filesystem scales up to dozens, hundreds, or even thousands of sites, the attack surface grows exponentially. Each new site and each connection brings added risk, creating more potential entry points for attackers, making each site a potential weakest link. This is why zero-trust security is essential when scaling. Scaling your infrastructure without zero-trust means scaling your vulnerabilities—but with zero-trust, you scale securely and confidently.
Enforce strict access controls to reduce the risk of insider threats. Centrally audit permissions with Varonis and alert on compliance violations. Faithfully enforce Windows ACLs and audit access with supported systems such as Splunk, Microsoft Sentinel, Netwrix, and others.
Integrating security into an enterprise-wide cloud-based file services platform.
CTERA allows organizations to launch and manage a modern global file system that delivers a wide variety of edge-to-cloud file services.
Our architecture ensures that edge devices only communicate with core systems over fully authenticated and encrypted channels. Edge devices never store sensitive credentials, eliminating the risk of credential theft or misuse. Additionally, all data access is governed by strict role-based access control (RBAC), ensuring both your users and devices can only interact with authorized resources.
We do this through mutual authentication between edge devices and core storage via X.509 certificates. All communication occurs over encrypted channels using TLS 1.3 with perfect forward secrecy (PFS). The centralized security authority ensures continuous verification of the device identity and enforces policies to prevent lateral movement or unauthorized access across the network.
We do so via SAML protocols. This integration allows our Zero Trust architecture to enforce centralized authentication and authorization policies across the organization. By leveraging existing IdPs, we enable single sign-on (SSO) and MFA, ensuring that user identities are continuously verified before granting access to resources, enhancing security while simplifying user management for businesses like yours.
Explore CTERA’s zero-trust solutions and strengthen your cybersecurity posture; talk to our team.