Security

Because Delphix interacts with some of your organization’s most important application data, security is very important.

This section covers everything you need to know about managing Delphix securely (user management, etc), and how Delphix works to ensure the software is not susceptible to vulnerabilities. This section includes standard hardening techniques you should apply to every Delphix Engine in your environment.

The Delphix Engine delivers its functionality through a web-based graphical user interface (GUI), web-based RESTful APIs, and a command-line interface (CLI) accessed over SSH. All three interfaces leverage the same accounts and privileges scheme. Access to the Delphix Operating System (DxOS) is restricted to Delphix Support and Delphix Professional Services and can be controlled through the Support Access Control mechanism described below.

Customer-specific software installations and modifications to the DxOS are not required or supported. Communications to/from connected systems (“sources” and “targets”) should be limited to required ports, and you should use encryption wherever possible.