Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
190 views1 page

IICS Data Security

Data transmission security is a key aspect of securing data in IICS. The Secure Agent communicates with IICS and data stores/applications through secure channels like TLS 1.2 encrypted using AES256-SHA. Data is encrypted both at rest and in transit for security. At rest, data is encrypted using AES 256-bit encryption with CBC and PKC5 padding. In transit, the Secure Agent authenticates with IICS using SSL and certificates, and all communication is TLS 1.2 encrypted using AES 256-bit cipher. Connectors also support secure protocols like HTTPS for encrypted transmission.

Uploaded by

ajaybhosal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
190 views1 page

IICS Data Security

Data transmission security is a key aspect of securing data in IICS. The Secure Agent communicates with IICS and data stores/applications through secure channels like TLS 1.2 encrypted using AES256-SHA. Data is encrypted both at rest and in transit for security. At rest, data is encrypted using AES 256-bit encryption with CBC and PKC5 padding. In transit, the Secure Agent authenticates with IICS using SSL and certificates, and all communication is TLS 1.2 encrypted using AES 256-bit cipher. Connectors also support secure protocols like HTTPS for encrypted transmission.

Uploaded by

ajaybhosal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

FAQ: How data gets encrypted in IICS at rest and in transit.

Solution
Data transmission security is a key aspect of securing data. In processing data, the Secure Agent communicates
with both the IICS host and data stores/SaaS applications.
This communication is secured as follows:
The Secure Agent initiates communication with Informatica Intelligent Cloud Services through a secure channel
and supports various tokens, such as username, SAML, or X.509 certificates. No inbound firewall ports need to
be opened at the user site for the user-hosted Secure Agent to communicate with the IICS host. The Secure
Agent code creates a virtual socket connection to communicate to the host and uses port 443 for all outbound
communication. The Secure Agent avoids data loss and transport delays by checking for availability before
connecting. The Secure Agent also performs network resiliency checks and retains full audit and session logs for
configurable duration to track any issue that may arise.

ENCRYPTION AT REST
The data is encrypted using the AES encryption algorithm. The AES encryption uses a 256-bit key with CBC and
PKC5 padding. Services like Integration Hub will store data on the IICS host in a multi-tenant data repository back
end.

ENCRYPTION IN TRANSIT
To defend against sniffer or man-in-the-middle attacks, the communication channel must be authenticated to
maintain its integrity, as well as ensure transport encryption. To achieve that, the Secure Agent authenticates
with the IICS host first using an SSL handshake and a digital certificate. All communication from the Secure
Agent to the IICS host is Transport Layer Security (TLS) 1.2 encrypted using AES256-SHA (256 bit) cipher.
The Secure Agent connects to source/target data stores and cloud applications using connectors. Connectors
are configured and support a variety of secure communication protocols like HTTPS, SFTP, FTPS, certificates,
etc. IICS leverages the underlying transport layer of these connector communication protocols to ensure that the
data is transmitted securely across data stores and applications. The data is transmitted encrypted via Transport
Layer Security (TLS) using AES (256 bit) cipher.

You might also like