Skip to content

Security for Aerospike Graph

Aerospike Graph Service (AGS) supports role-based access control (RBAC), TLS encryption, and audit logging. Use these features together to build a comprehensive security posture for your graph deployment.

Access control

AGS supports two levels of access control: database-level RBAC (if your Aerospike cluster already uses RBAC) and graph-level RBAC using JWTs. Use one or both depending on your security requirements:

Database-level RBAC
Authenticate against an RBAC-enabled cluster.
Graph-level RBAC
Assign roles to users with JWTs.

Encryption

AGS supports TLS encryption for data in transit between your application and AGS, and between AGS and Aerospike Database. You can enable TLS on either or both connections. Start with the TLS overview to understand the architecture:

TLS architecture
Understand TLS across Aerospike Graph.
Client encryption
TLS for Gremlin client connections.
Backend encryption
TLS for connections to Aerospike Database.

Auditing

AGS can log user actions for compliance and incident investigation. Audit logs capture write, delete, and call step operations, so you have a record of who changed what and when.

Compliance logging
Record graph mutations and call steps.
Feedback

Was this page helpful?

What type of feedback are you giving?

What would you like us to know?

+Capture screenshot

Can we reach out to you?