Skip to main content

SDF Container

SDF Containerin a Kubernetes environmentSidecar ContainerIt is distributed in the form of a structure that performs document encryption/decryption and security policy processing within the business system POD.


1. Overview


A deployment method optimized for cloud-native environments, operating independently within the same POD as the business system.

itemContent
Deployment TypeSidecar Container in Kubernetes POD
Target EnvironmentKubernetes / POD-based Cloud Environment
Terms of UseCustomers subscribed to Security365
Communication MethodLocalhost-based REST API calls within the same POD

2. Components


The main components included in the SDF Container configuration are as follows.

Componentsrole
SDF ContainerOperates as a sidecar and handles encryption/decryption requests
Business SystemBusiness applications of client companies that create or use documents
EnDec ServiceSecurity Document Header Processing and Key Management (Based on SKMS / EKMS)
SCI ServerKey Issuance/Inquiry and Encryption Policy Repository
Security365 Management CenterCompany Registration, App/Policy Integration Settings
SHIELDRM Web ConsoleCustom Key Policy and License Registration, Integration Management
InfoLineageDocument Distribution Tracking and Lineage Management
Log ServiceCollection of processing history and storage of audit logs
Key Vault (KMS)Integrating with EnDec as a Key Storage for Encryption

3. Integration Flow


The encryption/decryption process based on the SDF Container proceeds in the following order.

stepProcessing details
1. PrerequisitesAfter registering your company on the Security365 portal, manage keys and integration settings in the SHIELDRM web console.
2. License RegistrationRequest/issue a license to be used in the business system and link it with the SDF Container.
3. Encryption/Decryption RequestSending REST API requests from the business system (main container) to the SDF Container
4. EnDec ProcessingThe SDF Container receives keys and performs header generation/verification through the EnDec service.
5. Return ResultsStore the encrypted file in the shared repository and record the history in InfoLineage.
  • Business system isREST API CallIt can handle encryption and decryption with a key.
  • The request information includes the original file path, license information, processing options, and so on.

4. Key Features


FeaturesDescription
Independent ExecutionDeployable via sidecar without changing the business system code for immediate use
scalabilitySupport for automatic scaling at the POD level in a Kubernetes environment
Security IsolationEncryption processing is performed in a separate container, separating it from the business logic.
MonitoringSupport for real-time metric collection through Prometheus integration

5. Precautions


  • Container-based configuration isCustomers who subscribed to Security365can be used.
  • must**Internal Work System (POD)**It only works in an environment installed with a sidecar.
  • Independent execution without a license is not possible.
  • The detailed deployment guide isSDF Container Deployment GuidePlease refer to the document.