Skip to content

Aembit addresses the unique security challenges of managing access between workloads in modern, distributed environments. This section explains the threat modeling approach, the types of threats considered, and how Aembit’s controls mitigate those threats.

Aembit uses a hybrid deployment model that balances centralized control with distributed enforcement:

  • Aembit Cloud: Aembit Cloud serves as both the central control plane and management plane, making authorization decisions, evaluating policies, coordinating credential issuance, and providing administrative interfaces for configuration.Learn more: Managed SaaS control plane operated by Aembit for policy management, authorization decisions, and audit logging.

  • Aembit Edge: Aembit Edge represents components deployed within your operational environments that enforce Access Policies by intercepting traffic, verifying identities, and injecting credentials just-in-time.Learn more: Policy enforcement components deployed in your infrastructure as containers, sidecars, or proxies, depending on your integration pattern.

This model provides centralized policy management while keeping credential brokering close to your workloads for performance and security.

For detailed deployment patterns and architecture, see Software Architecture.

Aembit uses a structured, risk-based threat modeling process that systematically identifies, categorizes, and prioritizes potential security threats. This process follows these steps:

  • Identify Assets: Workloads, credentials, policies, audit logs.
  • Enumerate Threats: Unauthorized access, credential theft, supply chain attacks, insider threats, data exfiltration.
  • Assess Risks: Evaluate likelihood and impact.
  • Define Mitigations: Implement controls and monitoring.
Threat CategoryExample ScenarioAembit Mitigation
Unauthorized AccessCompromised workload attempts accessPolicy-based access control, identity verification
Credential TheftStolen API keys or tokensShort-lived credentials, secure brokering, audit logs
Supply Chain AttacksMalicious code in dependenciesSigned container images, policy enforcement
Insider ThreatsPrivileged user abuses accessRBAC, audit logging, separation of duties
Data ExfiltrationSensitive data sent to unauthorized destinationPolicy restrictions, monitoring, alerting

Aembit acts as a control point for workload-to-resource access, providing:

  • Centralized Policy Enforcement: Centrally managed, auditable policies govern all access.
  • Identity Federation: Integrates with cloud and on-prem identity providers to verify workload identities.
  • Credential Brokering: Issues Ephemeral credentials: Short-lived credentials issued on demand that automatically expire after a configured time period. Because they aren't stored persistently, they reduce the risk window if compromised., reducing the risk of long-lived secrets.
  • Comprehensive Auditing: Aembit logs all access requests and policy decisions for compliance and forensics.

The following diagram illustrates how Aembit mediates all workload access, enforcing policy, and logging events. Aembit denies and logs unauthorized attempts.

Threat model overview showing how Aembit mediates workload access, enforces policy, logs events, and denies unauthorized attempts from attackers

The preceding diagram shows how Aembit components interact:

  • Aembit Cloud - Managed SaaS control plane for policy management, credential brokering, and audit logging. Operated by Aembit.

  • Aembit Edge - Policy enforcement components deployed in your environment (as containers, sidecars, or proxies). Managed by you.

  • Server Workload: Server Workloads represent target services, APIs, databases, or applications that receive and respond to access requests from Client Workloads.Learn more - Your databases, APIs, or services requiring access control.

  • Client Workload: Client Workloads represent software applications, scripts, or automated processes that initiate access requests to Server Workloads, operating autonomously without direct user interaction.Learn more - Your applications or services requesting access to protected resources.

  • Audit Logs - Centralized event logs stored in Aembit Cloud for compliance and monitoring.

  • Policy Model: Policy-based access control with Access Policy: Access Policies define, enforce, and audit access between Client and Server Workloads by cryptographically verifying workload identity and contextual factors rather than relying on static secrets.Learn more
  • Identity Verification: OAuth 2.0/OIDC protocols
  • Policy Enforcement: Distributed enforcement via Aembit Edge
  • Ephemeral Credentials: Short-lived credentials with configurable TTL (Time to Live): The configured duration for which a credential, token, or cached value remains valid before expiring. Shorter TTLs reduce the window of exposure if a credential is compromised.
  • Just-in-Time Issuance: Credentials issued only when needed, never stored in application code
  • Automatic Rotation: Supported for compatible Credential Provider: Credential Providers obtain the specific access credentials—such as API keys, OAuth tokens, or temporary cloud credentials—that Client Workloads need to authenticate to Server Workloads.Learn more
  • Data in Transit: TLS 1.2 or higher for all communications
  • Data at Rest: AES-256 encryption for stored data
  • Key Management: Centralized key management in Aembit Cloud
  • Centralized Logging: All access requests logged to Aembit Cloud
  • SIEM Integration: Export logs to external SIEM systems
  • Compliance Support: Audit trail for regulatory requirements

For detailed cryptographic specifications, key management procedures, enterprise security commitments, incident response processes, and SLA details, contact Aembit support.

While Aembit provides robust controls, customers are responsible for:

  • Securing their own workloads and environments.
  • Configuring access policies appropriately.
  • Monitoring audit logs and responding to alerts.

Aembit’s threat model focuses on workload-to-resource access and identity:

  • Credential Exposure and Theft - Stolen API keys, leaked secrets, compromised credentials
  • Policy Enforcement - Unauthorized access, privilege escalation, access policy violations
  • Identity Verification - Workload impersonation, spoofing, man-in-the-middle attacks
  • Access Auditing - Visibility into access patterns, compliance monitoring, forensics

Aembit addresses workload identity and access control. You remain responsible for:

  • Network Security - DDoS protection, packet filtering, network segmentation
  • Application Security - SQL injection, XSS, input validation, secure coding practices
  • Endpoint Security - Host hardening, malware protection, patch management
  • Physical Security - Data center security, hardware protection

For Aembit’s compliance certifications and framework mappings, see Security Compliance.

For operational security commitments, SLA details, incident response procedures, and enterprise security specifications, contact Aembit support.