GDPR

Users of ITX Runtime Server are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data Protection Regulation (GDPR). Users are solely responsible for obtaining advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulations that may affect the user's business and any actions the user may need to take to comply with such laws and regulations.

The products, services, and other capabilities described herein are not suitable for all user situations and may have restricted availability. HCL and IBM do not provide legal, accounting, or auditing advice or represent or warrant that its services or products will ensure that users are in compliance with any law or regulation.

For more information about GDPR, see:

ITX Runtime Server enables an organization to integrate industry-based customer, supplier and business partner transactions across the enterprise. It helps automate complex transformation and validation of data between a range of different formats and standards. Securing and managing the personal data passed through the ITX Runtime Server for processing is a sole responsibility of the user. Some of the security guidelines that follow may help in securing the personal data:

  • Harden the master and worker nodes in the cluster based on security benchmarks like CIS Benchmarks.
  • Harden the Red Hat Enterprise Linux OS based on security benchmarks like CIS Benchmarks.
  • Secure the communication with ITX Runtime Server using HTTPS protocol instead of HTTP.
  • Secure the credentials of external systems accessed by ITX Runtime Server using AES-256 encryption in Resource Registry.
  • Use secure options provided by the data source/target adapters where applicable to securely process the data.
  • Encrypt and decrypt the data, process data through ITX Runtime Server's Cipher and OpenPGP adapters.
  • Secure the transport of data from/to maps run by ITX Runtime Server with HTTPS, FTPS adapters.
  • Cataloged maps would allow hiding the details of the map location, override settings of the deployed maps.
  • Monitor the outputs generated by the ITX Runtime Server, remove input and output files when not required.
  • Look out for security bulletins from ITX and Red Hat support teams to resolve security vulnerabilities.
  • Apply the security patches when released and keep the cluster nodes up to date to avoid security threats.
  • Refer ITX Knowledge Center and Red Hat OpenShift documentation on the security features available in the products.
  • Scan map and input files for malware/virus before uploading to the data volume through application endpoint.
  • Scan driver files and user-defined exit modules for malware/virus before uploading through the application endpoint.