This is an automated email from the ASF dual-hosted git repository.

eladkal pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/airflow.git


The following commit(s) were added to refs/heads/main by this push:
     new 09b8b06c54 Add "security infrastructure" paragraph to security model 
(#34301)
09b8b06c54 is described below

commit 09b8b06c54d54efde8750dcdc0983b391c01cd2b
Author: Jarek Potiuk <[email protected]>
AuthorDate: Tue Sep 12 12:19:19 2023 +0200

    Add "security infrastructure" paragraph to security model (#34301)
    
    Making clear that Deployment Manger is responsible for setting up
    the right infrastructure to apply some security expectations that
    organisations might have when deploying applications on premises
    or in their clouds.
---
 docs/apache-airflow/security/security_model.rst | 16 +++++++++++++++-
 1 file changed, 15 insertions(+), 1 deletion(-)

diff --git a/docs/apache-airflow/security/security_model.rst 
b/docs/apache-airflow/security/security_model.rst
index 0e22674acb..4030bf1c9f 100644
--- a/docs/apache-airflow/security/security_model.rst
+++ b/docs/apache-airflow/security/security_model.rst
@@ -98,7 +98,21 @@ For more information on the capabilities of authenticated UI 
users, see :doc:`/s
 Responsibilities of Deployment Managers
 ---------------------------------------
 
-Deployment Managers determine access levels and must understand the potential
+Deployment Managers are responsible for deploying airflow and make it 
accessible to the users
+in the way that follows best practices of secure deployment applicable to the 
organization where
+Airflow is deployed. This includes but is not limited to:
+
+* protecting communication using TLS/VPC and whatever network security is 
required by the organization
+  that is deploying Airflow
+* applying rate-limiting and other forms of protections that is usually 
applied to web applications
+* applying authentication and authorization to the web application so that 
only known and authorized
+  users can have access to Airflow
+* any kind of detection of unusual activity and protection against it
+
+Airflow does not implement any of those feature natively, and delegates it to 
the deployment managers
+to deploy all the necessary infrastructure to protect the deployment - as 
external infrastructure components.
+
+Deployment Managers also determine access levels and must understand the 
potential
 damage users can cause. Some Deployment Managers may further limit
 access through fine-grained privileges for the **Authenticated UI
 users**. However, these limitations are outside the basic Airflow's

Reply via email to