as a standalone stack, using the scanner stack deployment script, orĪ typical File Storage Security deployment only needs one scanner stack, but if you think you might need more, see How many stacks should I add? Bucket Listener Function.The scanner stack scans files and publishes the results to the Scan Result Topic. as a standalone stack, using the storage stack deployment script.įor information on how many storage stacks you should use in your deployment, see How many stacks should I add?.The storage stack monitors the protecting Google Cloud Storage bucket for incoming (added) files and sends them to the scanner stack for scanning. Files added to the protecting Google Cloud Storage bucket are scanned. The protecting Google Cloud Storage bucket is the storage bucket that is monitored for incoming (added) file. For example, it might quarantine or delete the file if it is found to be malicious.Ĭomponents Protecting Google Cloud Storage bucket Your custom post-scan action Function acts on the scan information provided in the Scan Result Topic.For details, see Understand tags and scan results. The PostScanActionTagFunction adds the scan results to the file using custom metadata (tags).After receiving the notification from Scan Result Topic:.the File Storage Security's Post Scan Action Tag Function.The Scan Result Topic notifies its subscribers that new scan results are available.(The console is not shown in the diagram). Sends the scan results to the File Storage Security console.Publishes the scan results to the Scan Result Topic in the storage stack.The Scanner Function does the following:.The scan results are returned to the Scanner Function. The Trend Micro Global Smart Protection Server leverages the Trend Micro Smart Protection Network (not shown in the diagram) to perform the remaining scanning on the file identification information (not the file).Sends the file identification information to the Trend Micro Global Smart Protection Server in the cloud.Generates file identification information.Finds the file in the Google Cloud Storage bucket at the URL location.Retrieves the URL in the message sent from the ScannerTopic.The Scanner Function, which is subscribed to the Scanner Topic, does the following:.The URL links back to the file that needs to be scanned. The Bucket Listener Function detects the event, and sends a signed URL containing authentication information in their query string to the Scanner Topic in the scanner stack.A user or program uploads a file to any Google Cloud Storage buckets.Information flows through this architecture as follows: The following architecture diagram illustrates the main File Storage Security components and information flow. This section illustrates the File Storage Security architecture, shows how information flows through the architecture during a scan operation and describes each of the components in detail.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |