SlideShare a Scribd company logo
Anypoint platform security components
-RajeshKumar
1
Anypoint platform security components
2
• Anypoint Enterprise Security
• API Security Manager
• Virtual Private Cloud (VPC)
Taking security
3
• MuleSoft’s approach to cloud security is two-folded
– MuleSoft actively and consciously avoids inspecting, storing, manipulating,
monitoring, or otherwise directly interacting with sensitive customer data
– MuleSoft provides a highly secure environment in which customers can
perform sensitive data manipulations
• A dedicated security team follows industry best practices, runs internal security
audits and maintains policies that span operations, data security, passwords
and credentials, and secure connectivity
Identity authentication mechanisms
4
• User authentication
– Username and password credentials
– Multi-factor authentication
– Token-based credentials
• API and server authentication
– Public/private key cryptography
• User authorization
– Role based access control (RBAC)
– Attribute based access control (ABAC)
– OAuth (2.0) delegated access control
• Federated identity management
– Single Sign-on
Message integrity
5
• Message verifier
– Message received by your API is verified as being the same as sent by
the client
• Digital signatures
– Client produces a signature by using an algorithm and a secret code
– API applies the same algorithm and code to produce its own signature
and compare it against the incoming signature
• Message safety
– Protection against potentially harmful data in the request
– Attacks often come through large XML documents with multiple levels of
nested elements
Security recommendations
6
• Use “Least Privilege Access” principle
• Perform periodic penetration testing
• Perform periodic external reviews
• Configure Logging and Alerting
• Configure secure properties
– Optionally consider (centralized) properties management
• Credentials management
• Tight control on who has administrative access
• Use encrypted/secured communications
– Both inside and outside the application’s scope
Anypoint Enterprise Security
7
• Collection of security features that enforce secure access to information in
Mule applications
• Provides various methods for applying security to Mule applications
• Requires an Enterprise license
• Add-on module that needs to be installed in Anypoint Studio
• Consists of 6 modules
• Suitable for both on-premise and cloudhub applications
Enterprise Security modules
8
• Mule Filter Processor
– Compares messages with filter criteria before processing
– Filter by IP/timestamp features are available
• Mule Credentials Vault
– Encrypts the property file
– Flow can access the data from property files
• Mule Message Encryption Processor
– Encrypt or Decrypt part of messages or entire payload
– JCE Encrypter, XML Encrypter, PGP Encrypter
Enterprise Security modules
9
• Mule Secure Token Service (STS) OAuth 2.0a Provider
– Security for REST service provider/consumer
• Mule Digital Signature Processor
– Ensure the integrity and authenticity of the message source
• Mule CRC32 processor
– Cyclic redundancy check (CRC) to messages to ensure message integrity
Virtual Private Cloud (VPC)
10
• The Virtual Private Cloud (VPC) offering allows you to virtually create a private
and isolated network in the cloud to host workers
• Choose to use this isolated network as it best suites your needs
– Host your applications in a VPC and take advantage of its load balancer
– Configure your own firewall rules for your VPC
– Connect your VPC to your corporate intranet
whether on-premises or in other clouds
via a VPN connection as if they were all part of a single, private
network
– Set a private DNS server so the workers hosted in a VPC communicate
with your internal network using your private host names

More Related Content

ODP
Anypoint platform security components
ODP
Mule security
ODP
Mule esb mmc
PPTX
Mule management console
PDF
Oracle vs-mulesoft-api-manager-features
PPT
Mule saas
PPT
Cloud hub in mule esb
PPTX
Mule enterprise security
Anypoint platform security components
Mule security
Mule esb mmc
Mule management console
Oracle vs-mulesoft-api-manager-features
Mule saas
Cloud hub in mule esb
Mule enterprise security

What's hot (20)

PPTX
Mule soft Basics
PPT
Anypoint data gateway
PPT
Mule cloudhub
PPT
Mule security
PPT
Mule esb-connectors
PPT
Anypoint platform release highlights
PDF
Mulesoft ppt
PPTX
Apply Rate Limiting Policy
PPT
Mule security
PPT
MULE-JAAS
PPT
Mule mule agent
PPTX
Integrating microservices in the cloud
PPTX
Mule Microsoft Share Point 2013 Connector
PPT
Mule mule management console
PPTX
Microservice-based Architecture on the Salesforce App Cloud
PPTX
Flows in mule
PPT
Mule anypoint enterprise security
PPTX
Anypoint enterprise security overview
PDF
Kaseya Corporate Update and Roadmap Q1 2014
PPT
Mule esb api layer
Mule soft Basics
Anypoint data gateway
Mule cloudhub
Mule security
Mule esb-connectors
Anypoint platform release highlights
Mulesoft ppt
Apply Rate Limiting Policy
Mule security
MULE-JAAS
Mule mule agent
Integrating microservices in the cloud
Mule Microsoft Share Point 2013 Connector
Mule mule management console
Microservice-based Architecture on the Salesforce App Cloud
Flows in mule
Mule anypoint enterprise security
Anypoint enterprise security overview
Kaseya Corporate Update and Roadmap Q1 2014
Mule esb api layer
Ad

Viewers also liked (20)

ODP
Mule esb transaction mgmt
PPTX
Mule message
PPTX
Web services
PPTX
Java-JSON-Jackson
PPTX
Java component
PPTX
Mule_Portal
ODP
Mule esb domain
PPTX
Mule Cloud Connectors-Save and Load OAuth
PPTX
Mule advanced
PPTX
Mule management console Architecture
PPTX
Mule message structure and varibles scopes
PPTX
Connection management
PPTX
PPTX
Mule message structure
ODP
Mule exception handlingstrategies
PPTX
Invoke component
PPTX
Mule message structure
PPTX
Connection management
ODP
Mule esb integration patterns
Mule esb transaction mgmt
Mule message
Web services
Java-JSON-Jackson
Java component
Mule_Portal
Mule esb domain
Mule Cloud Connectors-Save and Load OAuth
Mule advanced
Mule management console Architecture
Mule message structure and varibles scopes
Connection management
Mule message structure
Mule exception handlingstrategies
Invoke component
Mule message structure
Connection management
Mule esb integration patterns
Ad

Similar to Anypoint platform security components (20)

PPT
Chapter08
PDF
IoT Security Elements
PPTX
Anypoint enterprise security
PDF
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
PDF
Security Considerations for Microservices and Multi cloud
PPT
Unit_5 grid and cloud comuting security.pt
PDF
Client Server Network Security
PPTX
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
PPTX
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
PPTX
Jenkins Terraform Vault
PPT
Material best practices in network security using ethical hacking
ODP
Security components in mule esb
PPTX
Hybrid - Seguridad en Contenedores v3.pptx
PPTX
MD-102T00-ENU-PowerPoxxxxxxxxxint_05.pptx
PPTX
Securing ap is oauth and fine grained access control
PPTX
How to write secure code
PPTX
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
PPTX
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
PDF
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Chapter08
IoT Security Elements
Anypoint enterprise security
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Security Considerations for Microservices and Multi cloud
Unit_5 grid and cloud comuting security.pt
Client Server Network Security
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
Jenkins Terraform Vault
Material best practices in network security using ethical hacking
Security components in mule esb
Hybrid - Seguridad en Contenedores v3.pptx
MD-102T00-ENU-PowerPoxxxxxxxxxint_05.pptx
Securing ap is oauth and fine grained access control
How to write secure code
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Defending Applications In the Cloud: Architecting Layered Security Solutions ...

More from D.Rajesh Kumar (20)

PPTX
Mule soft meetup_-_finland_september_25th__2020 v2.0
PPTX
Meetup bangalore-sept5th 2020 (1)
PPTX
Mule soft meetup_-_finland_july_11th__2020
PPTX
Bangalore mulesoft meetup#10
PPTX
Meetup bangalore 9_novupdated
PPTX
Meetup bangalore aug31st2019
PPTX
Meetup bangalore june29th2019
PPTX
mulesoft meetup @ bangalore
PPTX
Meetup_Bangalore_Rajesh
PPT
Calico and container
PPT
Calico docker+ipam
PPT
Calico architecture
PPT
Calico to secure host interfaces
PPT
Calico and how interprets neutron api
PPT
Calico with open stack and chef
PPT
Calico with open stack
PPT
Calico with docker
PPT
Object Store in Mule
PPT
Slack connector with in MULE
PPT
MuleSoft Offers a Data Migration Solution
Mule soft meetup_-_finland_september_25th__2020 v2.0
Meetup bangalore-sept5th 2020 (1)
Mule soft meetup_-_finland_july_11th__2020
Bangalore mulesoft meetup#10
Meetup bangalore 9_novupdated
Meetup bangalore aug31st2019
Meetup bangalore june29th2019
mulesoft meetup @ bangalore
Meetup_Bangalore_Rajesh
Calico and container
Calico docker+ipam
Calico architecture
Calico to secure host interfaces
Calico and how interprets neutron api
Calico with open stack and chef
Calico with open stack
Calico with docker
Object Store in Mule
Slack connector with in MULE
MuleSoft Offers a Data Migration Solution

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Monthly Chronicles - July 2025
PPT
Teaching material agriculture food technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced IT Governance
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
NewMind AI Monthly Chronicles - July 2025
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced IT Governance
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Network Security Unit 5.pdf for BCA BBA.
Empathic Computing: Creating Shared Understanding

Anypoint platform security components

  • 1. Anypoint platform security components -RajeshKumar 1
  • 2. Anypoint platform security components 2 • Anypoint Enterprise Security • API Security Manager • Virtual Private Cloud (VPC)
  • 3. Taking security 3 • MuleSoft’s approach to cloud security is two-folded – MuleSoft actively and consciously avoids inspecting, storing, manipulating, monitoring, or otherwise directly interacting with sensitive customer data – MuleSoft provides a highly secure environment in which customers can perform sensitive data manipulations • A dedicated security team follows industry best practices, runs internal security audits and maintains policies that span operations, data security, passwords and credentials, and secure connectivity
  • 4. Identity authentication mechanisms 4 • User authentication – Username and password credentials – Multi-factor authentication – Token-based credentials • API and server authentication – Public/private key cryptography • User authorization – Role based access control (RBAC) – Attribute based access control (ABAC) – OAuth (2.0) delegated access control • Federated identity management – Single Sign-on
  • 5. Message integrity 5 • Message verifier – Message received by your API is verified as being the same as sent by the client • Digital signatures – Client produces a signature by using an algorithm and a secret code – API applies the same algorithm and code to produce its own signature and compare it against the incoming signature • Message safety – Protection against potentially harmful data in the request – Attacks often come through large XML documents with multiple levels of nested elements
  • 6. Security recommendations 6 • Use “Least Privilege Access” principle • Perform periodic penetration testing • Perform periodic external reviews • Configure Logging and Alerting • Configure secure properties – Optionally consider (centralized) properties management • Credentials management • Tight control on who has administrative access • Use encrypted/secured communications – Both inside and outside the application’s scope
  • 7. Anypoint Enterprise Security 7 • Collection of security features that enforce secure access to information in Mule applications • Provides various methods for applying security to Mule applications • Requires an Enterprise license • Add-on module that needs to be installed in Anypoint Studio • Consists of 6 modules • Suitable for both on-premise and cloudhub applications
  • 8. Enterprise Security modules 8 • Mule Filter Processor – Compares messages with filter criteria before processing – Filter by IP/timestamp features are available • Mule Credentials Vault – Encrypts the property file – Flow can access the data from property files • Mule Message Encryption Processor – Encrypt or Decrypt part of messages or entire payload – JCE Encrypter, XML Encrypter, PGP Encrypter
  • 9. Enterprise Security modules 9 • Mule Secure Token Service (STS) OAuth 2.0a Provider – Security for REST service provider/consumer • Mule Digital Signature Processor – Ensure the integrity and authenticity of the message source • Mule CRC32 processor – Cyclic redundancy check (CRC) to messages to ensure message integrity
  • 10. Virtual Private Cloud (VPC) 10 • The Virtual Private Cloud (VPC) offering allows you to virtually create a private and isolated network in the cloud to host workers • Choose to use this isolated network as it best suites your needs – Host your applications in a VPC and take advantage of its load balancer – Configure your own firewall rules for your VPC – Connect your VPC to your corporate intranet whether on-premises or in other clouds via a VPN connection as if they were all part of a single, private network – Set a private DNS server so the workers hosted in a VPC communicate with your internal network using your private host names