Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Nexus Hybrid Access Gateway is shipped as a virtual appliance that uses an Ubuntu base image. With every release of Hybrid Access Gateway this base image is hardened in different areas:

  • Only installing required software and services
  • Restricted user management
  • Continuous security updates 

Installed services

During installation, Hybrid Access Gateway installs only the OpenSSH server for communication from outside. A Postgres database is installed and only used for local communication. Connections from outside are disabled by default. During the installation, the default firewall of Ubuntu is applied.

Restricted user management

All services in Hybrid Access Gateway are running as a separate user. Authentication from outside is not allowed with that user. For authentication from outside, the user agadmin is created during installation. Writing permissions to Hybrid Access Gateway-related files are restricted to power users.

Continuous security updates

With every release of Hybrid Access Gateway, all binaries are updated to the latest versions to prevent security vulnerabilities as much as possible. Therefore, vulnerabilities like Spectre and Meltdown get fixed as soon as updates are available. A steady release cycle ensures prompt security updates.

Penetration testing

On a regular basis, Nexus instructs specialized, external companies to perform penetration tests on the latest versions of Hybrid Access Gateway, to ensure that it maintains it high security status.


Related information

  • No labels