This is an automated email from the ASF dual-hosted git repository.

ptupitsyn pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/ignite-3.git


The following commit(s) were added to refs/heads/main by this push:
     new 4b2a44e5ecb IGNITE-28104 Document security model (#7826)
4b2a44e5ecb is described below

commit 4b2a44e5ecb58a884e783dc82031ec3ce688415c
Author: IgGusev <[email protected]>
AuthorDate: Fri Mar 20 13:36:36 2026 +0200

    IGNITE-28104 Document security model (#7826)
---
 docs/docs/understand/architecture/security.md | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/docs/docs/understand/architecture/security.md 
b/docs/docs/understand/architecture/security.md
index ee2e17fd22a..a98ad204f63 100644
--- a/docs/docs/understand/architecture/security.md
+++ b/docs/docs/understand/architecture/security.md
@@ -8,6 +8,12 @@ sidebar_position: 4
 
 Apache Ignite 3 provides authentication and transport encryption to secure 
cluster access. Security is disabled by default and must be explicitly enabled 
in cluster configuration.
 
+## Security Model
+
+When it comes to Apache Ignite 3 security, it is very important to note that 
by having access to any cluster node it is possible to perform malicious 
actions on the cluster. There are no mechanisms that could provide protection 
for the cluster in such scenarios.
+
+Therefore, all network ports for Ignite 3 server nodes should only be 
available inside a protected subnetwork (the so-called demilitarized zone or 
DMZ). Should those ports be exposed outside of DMZ, it is advised to control 
access to them by using SSL certificates issued by a trusted Certification 
Authority (please see the [SSL/TLS 
configuration](/3.1.0/configure-and-operate/configuration/config-ssl-tls) 
documentation for more information).
+
 ## Security Components
 
 ```mermaid

Reply via email to