Essentials
Agent Security
Security information for the Cloud.Red Agent Version 3.0 or greater
WorldTech IT has successfully obtained SOC2 compliance certification.
- This demonstrates our dedication to maintaining strong controls and procedures related to security, availability, processing integrity, confidentiality, and privacy within our organization.
- Clients and partners can trust that our operations adhere to industry-recognized standards, reflecting a serious commitment to quality and security in our services.
2018 SOC 2® Description Criteria (With Revised Implementation Guidance – 2022)
The Cloud.Red Agent is a specialized and secure appliance that provides essential services in a controlled environment.
Based on Red Hat Embedded Linux, it has been meticulously designed to offer robust security without compromising functionality.
The following features demonstrate the security of the Cloud.Red agent:
Embedded Linux Image
- Limited Version:
The Cloud.Red agent utilizes a custom-created Linux image based on Red Hat Embedded Linux.
This is a streamlined version that excludes all unnecessary components, ensuring an optimized and secure environment. - Focused Libraries & Binaries:
Only the essential libraries and binaries required to support the agent are included.
This is not a full Linux installation, reducing the attack surface and increasing the system’s integrity.
Security-Enhanced Linux (SELinux)
- SELinux Kernel Modules:
These are enabled in the Cloud.Red agent, fortifying the system against unauthorized access and modifications. - Defined Policies:
Carefully crafted policies have been implemented to strictly regulate process permissions.
These policies ensure that processes can only perform actions and access resources that are vital for their proper operation.
Controlled Network Access
- Limited Open Ports:
The appliance’s operating system maintains a local firewall, with rules only allowing access on application-specific ports.
Application listeners are defined to only allow traffic from specific hosts, dropping foreign traffic. - SSH Access Restriction:
SSH access to the appliance is expressly prohibited, further enhancing the system’s security posture.
Compliance with License Agreement
- Customer Access Restriction:
Direct access to the appliance by customers is not permitted, in strict adherence to our license agreement with Red Hat. - Software Installation Limitation:
Installing additional client software on the appliance is impossible, reinforcing the system’s stability and minimizing potential vulnerabilities.