All Downloads are FREE. Search and download functionalities are using the official Maven repository.

.hazelcast.5.3.6.source-code.hazelcast-security-hardened.yaml Maven / Gradle / Ivy

There is a newer version: 5.5.0
Show newest version
# This is a sample Hazelcast configuration focused on hardened security.
# It lists configuration sections which could help with securing your installation.
#
# How to use it:
#   * rename `hazelcast.xml` in the `[HAZELCAST_INSTALL]/config` directory to `hazelcast.xml.bak`
#   * copy this file to the `[HAZELCAST_INSTALL]/config` directory with a new name `hazelcast.yaml`
#   * edit the copied `hazelcast.yaml` file:
#     - update IP addresses to match your environment;
#     - enable TLS, security and auditlog if you use the Hazelcast Enterprise;
#   * run Hazelcast with sensitive config values specified via a system property:
#
#     $ export JAVA_OPTS="-Dcustom.cluster.name=[YOUR_CLUSTER_NAME] -Duser.root.password=[SECRET_VALUE_HERE] -Duser.appuser.password=[ANOTHER_SECRET_HERE]"
#     $ HAZELCAST_CONFIG=config/hazelcast.yaml [HAZELCAST_INSTALL]/bin/hz-start
#

hazelcast:
  # Custom cluster name protects against unintended cluster formation between foreign members.
  # Let's set it via a system property.
  cluster-name: ${custom.cluster.name}
  properties:
    # Don't listen on all network interfaces, but bind to just one.
    # You should specify the interface IP address in the socket-endpoint configuration sections
    # within the advanced-network configuration part of this file.
    # E.g. advanced-network/member-server-socket-endpoint-config/interfaces/interfaces
    # See also https://docs.hazelcast.com/imdg/4.2/clusters/network-configuration.html#interfaces
    hazelcast.socket.bind.any: false

  management-center:
    # Explicitly disable the scripting operations and the console commands sent from the Management center.
    # The default value for both attributes is false already so this one is just to be sure and explicit.
    # Also disable access to the data for Management Center. The data access is enabled by default.
    # Only allow management connections from the local network.
    scripting-enabled: false
    console-enabled: false
    data-access-enabled: false
    # UPDATE THE INTERFACE VALUE TO FIT TO YOUR ENVIRONMENT!
    trusted-interfaces:
      - 192.168.1.*

  user-code-deployment:
    # Explicitly disable the user-code deployments. I.e. allow only code which already is on the classpath.
    # The default value is false already so this one is just to be sure and explicit.
    enabled: false

  jet:
    # Keep the Jet stream/batch processing engine disabled if you don't need it.
    # The default value is false already so this one is just to be sure and explicit.
    enabled: false
    # If you allow the Jet jobs, think twice before allowing custom code upload to the cluster!
    # The default value is false already so this one is just to be sure and explicit.
    resource-upload-enabled: false

  # Use the Advanced networking feature to separate protocols used in Hazelcast. Each protocol will have its own endpoint.
  # Protection introduced by the Advanced networking feature can be simply extended by the operating system features (e.g. firewall).
  advanced-network:
    enabled: true
    join:
      # Safer than the autodetection is the explicit usage of one discovery method. Let's disable the autodetection.'
      auto-detection:
        enabled: false
      # If you don't need to, don't use the multicast discovery as it advertises own socket address and cluster configuration
      # within the network
      multicast:
        enabled: false
      # The TCP-IP discovery directly lists explicitly cluster member addresses.
      tcp-ip:
        enabled: true
        # Use the member addresses including the port numbers, so Hazelcast won't try other socket addresses as a fallback.
        # UPDATE ADDRESSES IN THE LIST TO FIT TO YOUR ENVIRONMENT!
        member-list:
          - 192.168.1.101:15701
          - 192.168.1.102:15701
          - 192.168.1.103:15701
      aws:
        enabled: false
      gcp:
        enabled: false
      azure:
        enabled: false
      kubernetes:
        enabled: false
      eureka:
        enabled: false
    # The following part defines different kind of endpoints (protocols) each with its own socket address and configuration.'
    # Enable only endpoints (protocols) you will need!
    # For each endpoint only bind to interface with minimal scope access.
    # The Member endpoint is used for the member-to-member communication. You can increase the endpoint protection
    # by configuring firewall rules in such a way that only access from other member IP addresses will be allowed.
    member-server-socket-endpoint-config:
      interfaces:
        enabled: true
        # UPDATE THE INTERFACE VALUE TO FIT TO YOUR ENVIRONMENT!
        interfaces:
          - 192.168.1.*
      port:
        # use the explicit port number without fallback
        auto-increment: false
        # using a non-default port number can prevent an attacker to identify the scanned open port
        port: 15701
      # TLS configuration for the Hazelcast member-to-member communication protocol.
      ssl:
        # TLS (SSL) is an enterprise feature and it's not available in Hazelcast community distribution
        # (therefor the value of enable attribute is `false` here).
        # If you have an Enterprise license and the Hazelcast Enterprise distribution,
        # you can enable the TLS (SSL) to secure the communication between members.
        enabled: false
        properties:
          # The PKCS12 is a standard and recommended type for keystores and truststores.
          keyStoreType: PKCS12
          keyStore: /opt/hazelcast-keystore.p12
          keyStorePassword: YourSecretGoesHere
          trustStoreType: PKCS12
          trustStore: /opt/hazelcast-truststore.p12
          trustStorePassword: ACorrectPasswordGoesHere
          # Without mutual authentication, the communication between the nodes would be encrypted, but still anyone can
          # connect and establish such encrypted connection. Its (client-side) identity would not be verified.
          # Therefor use REQUIRED for the mutual authentication.
          mutualAuthentication: REQUIRED
          # we recommend to use TLS version 1.3 if your Java version supports it
          protocol: TLSv1.3
          # explicit ciphersuites specification prevents defaulting to platform configured ones which may be weak
          ciphersuites: TLS_AES_128_GCM_SHA256
          # If your PKI infrastructure supports it, enable the identity validation. In such case the client side of
          # a TLS connection will verify the server's IP address matches the ones listed in the server's' certificate.
          validateIdentity: false
    # If you use client-server Hazelcast deployment mode, you'll probably use more clients and the access restrictions
    # to the client endpoint won't be so strict.
    client-server-socket-endpoint-config:
      interfaces:
        enabled: true
        # UPDATE THE INTERFACE VALUE TO FIT TO YOUR ENVIRONMENT!
        interfaces:
          - 192.168.1.*
      port:
        auto-increment: false
        port: 22957
      # TLS configuration for the client protocol listener (acceptor).
      ssl:
        # TLS (SSL) is an enterprise feature and it's not available in Hazelcast community distribution
        # (therefor the value of enable attribute is `false` here).
        # If you have an Enterprise license and the Hazelcast Enterprise distribution,
        # you should enable the TLS to secure the communication between clients and members.
        enabled: false
        properties:
          keyStoreType: PKCS12
          keyStore: /opt/hazelcast-keystore.p12
          keyStorePassword: YourSecretGoesHere
          trustStoreType: PKCS12
          trustStore: /opt/hazelcast-truststore.p12
          trustStorePassword: ACorrectPasswordGoesHere
          mutualAuthentication: REQUIRED
          protocol: TLSv1.3
          ciphersuites: TLS_AES_128_GCM_SHA256
          validateIdentity: false
    # If you don't need the HTTP REST access, remove the following section
    rest-server-socket-endpoint-config:
      interfaces:
        enabled: true
        # if you want to allow REST cluster management operations, it's a good idea to allow access from the localhost only.
        interfaces:
          - 127.0.0.1
      port:
        auto-increment: false
        port: 8080
      # Enable only REST URL groups you need. Keep the rest disabled.
      endpoint-groups:
        HEALTH_CHECK:
          enabled: true
        DATA:
          enabled: false
        CLUSTER_READ:
          enabled: false
        CLUSTER_WRITE:
          enabled: false
        WAN:
          enabled: false
        PERSISTENCE:
          enabled: false
        CP:
          enabled: false
      # Again, the Enterprise users may enable the TLS encryption for this endpoint.
      ssl:
        enabled: false
        properties:
          keyStoreType: PKCS12
          keyStore: /opt/hazelcast-https.p12
          keyStorePassword: YourSecretGoesHere

################################################################################
### Enterprise settings
################################################################################

  # The License is required if you want to use Enterprise security features 
  license-key: Enterprise License Key

  # Enterprise users may enable additional logging through the auditlog feature.
  # The default implementation logs through the standard Hazelcast logging mechanism
  # with category name "hazelcast.auditlog".
  auditlog:
    enabled: false

  # Enterprise security configuration
  security:
    enabled: false
    # The realms are named security configuration definitions which can be referred from other parts of the
    # configuration. The realms may contain authentication and identity part. The authentication defines how
    # authentication requests from outside are verified. The identity defines the member own identity in a 
    # given realm.
    realms:
      # In this sample configuration we use a simple username/password authentication between cluster members.
      # All members share the same identity defined here. We don't need to add authentication section here, because
      # the default one will check username and password from the defined "identity" configuration.
      - name: passwordRealm-members
        identity:
          username-password:
             username: aUserNameOfYourChoice
             password: PutAPasswordHere
      # As a sample configuration for client protocol is the simple authentication. It allows a fine-grained control
      # over the role assignment. As this realm is used to verify incoming client requests only, there is no need
      # to specify the identity.
      - name: simpleRealm-clients
        authentication:
          simple:
            users:
              - username: root
                password: ${user.root.password}
                roles:
                  - admin
              - username: appuser
                password: ${user.appuser.password}
                roles:
                  - monitor
                  - application
    # map the member protocol authentication to one of the defined realms
    member-authentication:
      realm: passwordRealm-members
    # map the client protocol authentication to one of the defined realms
    client-authentication:
      realm: simpleRealm-clients
    # Assign permissions to role names (principals) and remote addresses (endpoints).
    # Follow the least privilege principle.
    client-permissions:
      # local clients with "admin" role assigned have full access to all operations
      all:
        principal: admin
        endpoints:
          - 127.0.0.1
      map:
        # every authenticated client can work with a map named "playground"
        - name: playground
          actions:
            - all
        # clients with role "monitor" can read from a map named "accounts"
        - name: accounts
          principal: monitor
          actions:
            - read
        # clients with role "application" can work with the "accounts" map if they come from given network segments
        - name: accounts
          principal: application
          # UPDATE THE ENDPOINTS TO FIT TO YOUR ENVIRONMENT!
          endpoints:
            - 192.168.1.*
            - 192.168.2.*
          actions:
            - create
            - destroy
            - put
            - read
            - remove
            - lock
  # If you use persistence in Hazelcast, consider encrypting the data stored on the filesystem.
  persistence:
    enabled: false
    base-dir: /path/to/persistence-data
    encryption-at-rest:
      enabled: true
      algorithm: AES/CBC/PKCS5Padding
      salt: YourSaltHerePlease
      secure-store:
        keystore:
          type: PKCS12
          path: /opt/persistence-master-key.p12
          password: ACorrectPasswordGoesHere




© 2015 - 2024 Weber Informatics LLC | Privacy Policy