Security

Supermetal's security architecture is designed to protect your data while maintaining the flexibility of our Bring Your Own Cloud (BYOC) model. This document provides information on how we secure both the Supermetal Control Plane and Data Plane components.

Security Architecture

Supermetal employs a secure, split-architecture model that separates our responsibilities from yours:

  • Control Plane: Managed by Supermetal, providing orchestration, monitoring, and management capabilities
  • Data Plane: Deployed in your cloud environment (AWS or Azure), processing your data within your security perimeter

Authentication & Access Control

Control Plane Authentication

Supermetal's Control Plane implements multiple layers of authentication to protect your account and data:

Authentication MethodDescription
User AuthenticationAccess to the Supermetal Cloud Console requires strong user authentication
SSO IntegrationSupport for SAML/OIDC providers like Okta, Azure AD / Microsoft Entra ID, Google Workspace
Multi-Factor AuthenticationOptional but recommended MFA for additional account security
API AuthenticationAPI keys for programmatic access with time-based expiration

Role-Based Access Control (RBAC)

Supermetal's access control system enables precise permission management:

  • Predefined Roles: Admin, Operator, Viewer roles with appropriate permissions
  • Custom Roles: Create roles with specific permissions for your organization's needs
  • Resource-Level Permissions: Control access to specific connections, and environments

Network Security

Control Plane Network Security

  • All Control Plane services operate within private subnets with strict security controls
  • TLS 1.2+ for all communications with the Control Plane

Data Plane Network Security

The Data Plane operates entirely within your cloud environment:

  • VPC/VNet Isolation: The Supermetal Agent runs within your private virtual network
  • Private Connectivity Options:
    • AWS: PrivateLink for secure connectivity to the Control Plane
    • Azure: Private Link for secure connectivity to the Control Plane

Data Security & Encryption

Encryption in Transit

  • Browser to Console: HTTPS with TLS 1.2+
  • Control Plane to Data Plane: TLS 1.2+ over private connections
  • Data Plane to Databases: TLS connections for database communication

Encryption at Rest

  • Control Plane: All configuration data encrypted at rest using AWS KMS keys (AES-GCM-256)
  • Data Plane:
    • Buffer bucket/container is encrypted using your cloud provider's KMS/Key Vault encryption
    • Customer-managed keys (CMKs) support for enhanced control

Data Processing

  • Data remains within your cloud environment
  • No persistent data storage in the Supermetal Control Plane
  • Only metadata and telemetry are sent to the Control Plane

Secrets Management

Supermetal implements a secure approach to credential management:

  • Zero Knowledge Design: Supermetal control plane stores encrypted database credentials, only the data plane agents have access to decrypt the credentials
  • Cloud Provider Integration:
    • AWS: Integration with Secrets Manager for credential retrieval
    • Azure: Integration with Key Vault for secure credential storage

Shared Responsibility Model

Supermetal operates on a shared responsibility model for security in our BYOC deployments. This model clearly defines which security aspects are managed by Supermetal and which are the customer's responsibility.

CategorySecurity AreaSupermetal ResponsibilityCustomer Responsibility
Infrastructure & ComputeControl Plane infrastructure
Data Plane infrastructure
Software & UpdatesControl Plane security
Data Plane security
Control Plane updates
Data Plane updates✓ (provides)✓ (applies)
Network SecurityNetwork security for Control Plane
Network security for Data Plane✓ (allow access)
VPC/VNet configuration✓ (requirements)✓ (implementation)
Private Link/Endpoint (Control Plane side)
Private Link/Endpoint (Customer side)
Identity & Access ManagementControl Plane authentication
User access management✓ (platform controls)✓ (user assignment)
IAM roles/policies for Agent✓ (guidance)✓ (implementation)
Database access controls
Data SecurityEncryption of Control Plane data
Encryption of Data Plane / Agent buffer✓ (provides)✓ (applies)
Database security
Data residency controls✓ (options)✓ (enforcement)
Database credentials management✓ (encryption)✓ (management)
Monitoring & Incident ResponseMonitoring of Control Plane
Monitoring of Data Plane✓ (agent health)✓ (environment)
Security incident response (Control Plane)
Security incident response (Data Plane)✓ (assistance)✓ (primary)
Audit logging for Control Plane
Audit logging for Data Plane✓ (agent logs)✓ (infrastructure)
Compliance & GovernanceRegulatory compliance documentation✓ (platform)✓ (overall)
Compliance certifications✓ (platform)
Security policies and procedures✓ (platform)✓ (organization)
Risk assessments✓ (platform)✓ (implementation)
  • Supermetal is responsible for the security of the Control Plane, the Agent security, platform authentication, encryption of Control Plane data, and providing security requirements and guidance for the Data Plane.

  • Customers are responsible for securing their cloud environment, implementing IAM roles/policies, database security, and providing the cloud infrastructure where Supermetal manages the Data Plane components.

  • Shared responsibilities include:

    • Network security for Data Plane: Supermetal manages the security of Data Plane components, while customers configure their cloud environment to allow appropriate access.
    • Data Plane monitoring: Supermetal monitors agent health and functionality, while customers monitor the infrastructure environment.
    • Security updates: Supermetal provides secure updates, while customers are responsible for applying them.
    • Encryption: Supermetal designs encryption requirements, while customers implement them in their environment.

Last updated on