Security principles

The Delphix approach is based on:

  • Embrace separation of duties: Isolate and compartmentalize capabilities and privileges and never give or concentrate access to a single role.

  • Apply the principle of least privilege: Users should obtain only those privileges needed to do their jobs and only for as long as they are needed.

  • Use an open, simple design: Make security mechanisms simple and easy to use, and rely on proven, peer-reviewed solutions.

  • Use a layered defense: Provide no single point of failure; if one layer fails to catch an error, catch it in another layer.

  • Use complete mediation and authentication: Control and check every access point every time.

  • Use fail-safes: Deny access when not explicitly authorized. Prevent faults from causing an opportunity to compromise.

  • Protect data at rest and data in motion: Utilize common security protocols as well as features of the source database and database software to protect data at all times.

  • Minimize the attack surface: Present the minimum sockets, services, webpages, and accounts necessary to operate.

  • Don’t rely on obscurity: Be secure even if everything but the key is known.

  • Audit and monitor everything: Provide a tamper-proof trail of evidence.

  • Leverage the environment: Design the Delphix Engine to leverage the security features offered by databases, operating systems, storage devices, and networks.

  • Anticipate external attack vectors: Combat attacks sourced from connected systems.

  • Enforce strong credentials: Define and enforce password policies.