Description
GenRocket is available through a Virtual Private Cloud (VPN) or a Dedicated Private Cloud (DPC). This article provides detailed information about GenRocket's architecture.
In This Article
- Architecture Video
- GenRocket is Built on a Hybrid Architecture
- Cloud Component Hosting Security
- Cloud Component Connection Security
- On-Prem Component Runtime Security
- Additional Resources
Architecture Video
The following video provides more information about the GenRocket Architecture and these options.
GenRocket is Built on a Hybrid Architecture
- Cloud Component- Where synthetic data is modeled and designed.
- On-Prem Component- Where synthetic data is locally generated.
Cloud Component Hosting Security
GenRocket offers a secure hosted cloud solution:
- SaaS solution Hosted in a Virtual Private Cloud
- Hosted on AWS & certified ISO 27001 compliant
- AWS Security Groups provide Firewall security
- AWS WAF is used to protect against DDOS attacks
- Test Data Cases contain no data
- No customer data is sent to the cloud
- No customer data is stored in the cloud
- No synthetic data is generated in the cloud
Cloud Component Connection Security
Connection to GenRocket cloud is fully secured:
- All sessions use HTTPS with TLS 1.2 encryption
- All transmitted files undergo a checksum validation
- All users must pass a license verification check
- Users are authenticated with encrypted passwords
- SSO & MFA are available for extra security
- Org Admin assigns & manages all user licenses
- Restricted user access via role-based permissions
On-Prem Component Runtime Security
GenRocket offers a secure hosted cloud solution:
- GenRocket Runtime is a set of Java Jar files
- Runtime builds are scanned by Snyk
- A checksum validation is performed on all JARs
- Test Data Cases are executed by the Runtime
- G-Repository auto syncs Test Data Cases
- G-Repository is a set of Java Jar files
- All connection files are created and stored locally
- All data is generated in the customer environment
Additional Resources
The following links can be used to learn more about some of the security items mentioned in this article:
Topic | Description |
Single Sign-On (SSO) | Learn more about setting up SSO for your organization. |
Multi-Factor Authentication (MFA) | Learn more about setting up MFA for your organization. |
User Management Overview | Learn more about available user management functionality. |
Team Permissions | Learn more about the team permissions. This feature can be used to ensure users are only able to access the appropriate Projects and manage permitted information within them. |
GenRocket Runtime | Learn more about GenRocket Runtime. |
G-Repository Overview | Learn more about G-Repository Server and Client. |