Automation 360 Cloud for secure access and connectivity
- Updated: 2024/12/18
Automation 360 Cloud for secure access and connectivity
You can develop and run bots securely using the Automation 360 Cloud access security.
High-level architecture of Cloud deployment
The following architecture diagram provides a high-level workflow of the Automation 360
Cloud deployment:
- Using a browser, you log into the Control Room and create users and roles. You perform this process on the Automation 360 Cloud.
- You install the Bot Agent on your Windows device to run bots locally. You perform this process on your infrastructure.
- Data flow between the Automation 360 Cloud and the Bot Agent on your Windows device on your infrastructure is encrypted using TLS (outbound port 443 only).
Identity and Access Management (IAM) security for user system
- When an admin user logs into the Automation 360 Control Room for the first time, the admin can configure SAML 2.0 to connect the Automation 360 Cloud Control Room to their own Identity Provider (IdP) so that their users can log in to the Control Room using MFA (multi-factor authentication).
- The admin can then create the required users and roles or permissions to perform certain activities (such as developing and running bots) in the Control Room.
- The Automation 360 Control Room users can then log in through MFA and start creating and running bots.
- Additionally, the admin can configure an allowed IP address range to manage user logins through the Administrator settings in the Control Room.
To learn more about Automation 360 Cloud, see Get started with Automation 360 Cloud.
Secure connectivity to run bots
You run bots locally on a Windows machine on which the Bot Agent is deployed. You can download and install the Bot Agent on your devices or deploy to a pool of virtual machines.
- The integrity of the device on which the Bot Agent is installed is not compromised.
- The user organization has instituted security safeguards and controls to prevent Bot Agent takeover and system-level user breaches.
- The user environment is safe from network-based attacks such as Domain Name System (DNS) cache poisoning, Address Resolution Protocol (ARP) spoofing, and so on.
- Bot Agent installation and registration
- When you register your device, the Bot Agent device is provided a JSON Web Token (JWT) to start the registration process with the Control Room. If the token provided by the Bot Agent device does not match the token provided by the Control Room, the registration process will fail. This authenticates the client Bot Agent device to the Control Room.
- Communication between Bot Agent and Control Room
- The Bot Agent device establishes a websocket connection to the Control Room using HTTPS (outbound port 443) and no inbound connection is required.
- Schedule bots to run
- Control Room users can schedule bots to run. Compiled bots are downloaded to run on the Bot Agent devices and operational logs are sent from the Bot Agent devices to the Control Room.
- Secure credentials for bots
- Bots that run on the Bot Agent devices need to log in to the device using credentials. You can store credentials securely in the Automation 360 Cloud Control Room credential vault. Alternatively, you can store credentials in a customer-hosted key management system (for example, CyberArk). When you store credentials in the customer-hosted key management system, you must have connectivity between the Control Room and the customer's key management system. To provide connectivity and allow access, you must configure the Automation 360 Cloud IP addresses for the specific Automation 360 Cloud region that is hosting the Control Room in their firewall. For more information, see Control Room IP addresses for external integrations.
Secure operations in Automation 360 Cloud
Automation 360 Cloud is secure and meets compliance standards for: SOC 1, SOC 2, ISO 27001:2022: Information Security Management Systems (ISMS), ISO 27017:2015: Information Security Controls for Cloud Services, ISO 27018:2019: Protection of Personally Identifiable Information (PII) in Cloud environments and HITRUST.
-
For information about Automation 360 Cloud deployment and operational models, see Automation 360 Cloud Security and Data Privacy.
-
For Automation 360 Cloud compliance reports, see Compliance Portal.