Security for Aerospike Graph
Aerospike Graph Service (AGS) supports role-based access control (RBAC), TLS encryption, and audit logging. Use these features together to build a comprehensive security posture for your graph deployment.
Access control
AGS supports two levels of access control: database-level RBAC (if your Aerospike cluster already uses RBAC) and graph-level RBAC using JWTs. Use one or both depending on your security requirements:
Encryption
AGS supports TLS encryption for data in transit between your application and AGS, and between AGS and Aerospike Database. You can enable TLS on either or both connections. Start with the TLS overview to understand the architecture:
Auditing
AGS can log user actions for compliance and incident investigation. Audit logs capture write, delete, and call step operations, so you have a record of who changed what and when.