Security
​
GridMarkets executes tasks via our partner network of secured cloud providers (e.g. Oracle) - our “suppliers”. Platform security is generally aligned along MPAA security guidelines and specifically focuses on: network access, machine security, authentication and authorization, logging and monitoring, content management and content transfer. Each of these areas is broken down below.
​
Interested in a deep dive? Use the button below to schedule a call.
​
​
​
Network Security
-
No direct outside connection to any of the VMs is permitted which greatly reduces the surface vector for any possible attack, simply by not exposing the compute nodes to the Internet.
-
Network connections to/from VMs are controlled through a local NAT on every cluster.
-
All traffic is strictly switched and confined to a designated cluster VLAN; no hubs or repeaters are used.
-
Wireless communication is not used to transfer data within the GridMarkets infrastructure.
-
All data transfers and API calls are via secure HTTPS connections (orange arrows).
​
​
​
​
Machine Security
-
Input/Output devices on all VMs are disabled (e.g. to prevent any unauthorized USB devices).
-
A VM instance is used only for one job & its files and is then destroyed, preventing any possibility of data being obtained by subsequent jobs by other users.
-
All jobs run with normal user permissions with no access to administrative functions on the machine.
-
Processing units are encapsulated in secure Docker containers within VMs to minimize security risks.
​
​
​
​
Authentication and Authorization
-
GridMarkets has no direct access to clients’ environments through the applications and plugins it provides. These installed components only access information on GridMarkets’ systems via secure HTTPS connections - e.g. for file listings or to transfer files.
-
All access to GridMarkets’ servers is only via private keys with two-factor authentication that are not made available to anyone outside of GridMarkets.
-
Authentication is over HTTPS to both the GridMarkets “Head-end” API (https://api.gridmarkets.com) and Job Manager Portal (https://portal.gridmarkets.com).
​
​
​
​
Logging and Monitoring
-
Unexpected behavior can result in the shut-down of errant or all processes if deemed necessary.
-
Suppliers of server capacity can only non-intrusively monitor behavior outside the VM - i.e. only analyze resource utilization and not its purpose.
​
​
​
Content Management and Transfer
-
All data transfers are via GridMarkets’ purpose-built “Envoy” tool that uses industry-standard HTTPS for all transfers to & from Google’s Cloud Storage where the data resides in individual account buckets and is authenticated using Google Service Accounts. Please see https://cloud.google.com/security/ for more information on Google Cloud’s security. The client only needs access to this “Long-term Storage”; client firewalls only need to permit access to Google’s domain via wildcard addressing.
-
All content on suppliers’ servers is encrypted on disc with GridMarkets’ private keys (“Long Term Storage” & “Filer” above); user-specific private keys can be optionally used.
-
Only the specific project (not even account) directory is NFS-mounted by the VMs, preventing access to any other location on the Filer.
-
Content stored on suppliers’ servers is purged after a defined period of no access, or can be optionally deleted after transmission.
-
Purpose-built, secured and dedicated VMs manage the transfer of content.
​
​
​