Skip to main content

SDF Container

SDF Containerin a Kubernetes environmentSidecar ContainerIt is distributed in the form of a structure that performs document encryption/decryption and security policy processing within the business system POD.


1. Overview


A deployment method optimized for cloud-native environments, operating independently within the same POD as the business system.

itemContent
Deployment TypeSidecar Container in Kubernetes POD
Target EnvironmentKubernetes / POD-based Cloud Environment
Terms of UseCustomers subscribed to Security365
Communication MethodLocalhost-based REST API calls within the same POD

2. Components


The main elements included in the SDF Container configuration are as follows.

Componentsrole
SDF ContainerOperates as a sidecar and handles encryption/decryption requests
Business SystemBusiness applications of client companies that create or use documents
EnDec ServiceSecurity Document Header Processing and Key Management (Based on SKMS / EKMS)
SCI ServerKey Issuance/Inquiry and Encryption Policy Repository
Security365 Management CenterCompany Registration, App/Policy Integration Settings
SHIELDRM Web ConsoleCustom Key Policy and License Registration, Integration Management
InfoLineageDocument Distribution Tracking and Lineage Management
Log ServiceCollection of processing history and storage of audit logs
Key Vault (KMS)Integrating EnDec with the Encryption Key Store

3. Integration Flow


The encryption/decryption process based on the SDF Container proceeds in the following order.

StepProcessing details
1. PrerequisitesAfter registering your company on the Security365 portal, manage keys and integration settings in the SHIELDRM web console.
2. License RegistrationRequest/issue licenses to be used in the business system and link with the SDF Container.
3. Encryption/Decryption RequestSending REST API requests from the business system (main container) to the SDF Container
4. EnDec ProcessingSDF Container receives keys and performs header generation/verification through the EnDec service.
5. Return ResultsStore the encrypted file in the shared repository and record the history in InfoLineage.
  • Business systems areREST API CallIt can handle encryption and decryption with a key.
  • The request information includes the original file path, license information, processing options, and so on.

4. Key Features


FeaturesDescription
Independent ExecutionDeployable via sidecar without changing the business system code, ready for immediate use.
ScalabilitySupport for automatic scaling at the POD level in a Kubernetes environment
Security IsolationEncryption processing is performed in a separate container, separating it from the business logic.
MonitoringSupport for real-time metric collection through Prometheus integration

5. Precautions


  • Container-based configuration isSecurity365 Registered Customerscan only be used.
  • must**Internal Work System (POD)**It only works in an environment installed with a sidecar.
  • Independent execution without a license is not possible.
  • The detailed deployment guide isSDF Container Deployment GuidePlease refer to the document.