Security Best Practices
Recommendations for securing your Centrify deployments and integrations.
Overview
While Centrify implements robust security measures at the platform level, security is a shared responsibility. This guide provides recommendations for securing your Centrify deployments and integrations to ensure the highest level of protection for your data and AI applications.
Account Security
- Strong Authentication: Enable multi-factor authentication (MFA) for all user accounts to prevent unauthorized access.
- Role-Based Access: Implement the principle of least privilege by assigning users only the permissions they need to perform their job functions.
- Regular Access Reviews: Periodically review user access and remove accounts for users who no longer require access.
- Password Policies: Enforce strong password requirements and regular password rotation.
API Security
- API Key Management: Treat API keys as sensitive credentials and store them securely.
- Regular Key Rotation: Rotate API keys regularly to limit the impact of potential key compromise.
- Scoped API Keys: Use API keys with the minimum required permissions for each integration.
- Secure Storage: Store API keys in secure credential management systems, not in code repositories or configuration files.
Network Security
- IP Allowlisting: Restrict API access to specific IP addresses or ranges when possible.
- VPC Integration: For enterprise customers, consider using VPC peering or private endpoints for enhanced network security.
- TLS Configuration: Ensure your clients use modern TLS versions and secure cipher suites when connecting to Centrify APIs.
- Network Monitoring: Implement monitoring for unusual API access patterns that could indicate compromise.
Data Security
- Data Minimization: Only send the data necessary for your use case to Centrify's APIs.
- PII Handling: Consider anonymizing or pseudonymizing personally identifiable information before processing.
- Data Classification: Implement data classification policies to ensure appropriate handling of sensitive information.
- Secure Development: Follow secure coding practices in applications that integrate with Centrify.