Understanding Corsha
Introduction to the Corsha Security Management Solution
Corsha
Corsha is an Identity Provider for Machines that allows enterprises to connect securely, move data, and automate with confidence from anywhere to anywhere.
Many organizations today rely on static secrets such as keys, tokens, and certificates to secure communication between machines. However, these secrets are increasingly being compromised, resulting in significant data breaches across both public and private sectors. The escalating number of security incidents involving non-human identities (NHIs) highlights the urgent need for enhanced protection measures.
Corsha stands out as the one and only identity provider focused solely on machines, redefining the landscape of machine identity management. We offer a comprehensive product solution designed to address the unique challenges of NHIs and provide robust, identity-first security for machine-to-machine communication.
Reimagining Machine Identity
Corsha reimagines machine identity management by creating an abstraction layer that bridges NHI protection, access control, and security testing. This innovation establishes a new category of NHI Identity and Access Management, addressing the static nature of API secrets with a dynamic, identity-first approach. By automating the creation, management, and validation of machine identities, Corsha removes the manual, error-prone aspects of traditional secret management and ensures robust security for API communications.
Strengthened Security
Machine secrets alone are not sufficient for secure identity management; they can be stolen and exploited. Corsha’s Identity Provider (IdP) and authentication platform introduce a second factor of authentication, significantly mitigating the risks associated with secret management. This approach reinforces the security of machine identities and reduces vulnerabilities.
Unified Communication View
Corsha provides a unified view of protected machine communication through the Corsha Console. This feature ensures that only trusted machines can access your services. Administrators can configure trust levels and schedule access for machines or groups, following a deny-first approach that enhances API security by minimizing unauthorized access and reducing attack surfaces.
Discovery and Enforcement
The Corsha Gatekeeper plays a critical role in identifying trusted machines by analyzing all API requests. It starts in discovery mode, allowing your API to function smoothly while Corsha learns your environment and communication patterns. The system then transitions to enforcement mode, ensuring that only authorized machines can access your services based on established trust levels.
Enhanced Machine Identity
The Corsha Authenticator generates one-time-use credentials for API requests. This process adds a crucial second factor of authentication, effectively eliminating the risk of secrets theft and preventing the reuse of intercepted credentials. By introducing this additional layer of security, Corsha ensures that each request is verified and protected, further safeguarding sensitive communications.
Flexible Deployment
Corsha is designed for seamless deployment across various environments, including public clouds, private clouds, on-premises data centers, and third-party SaaS tools. Our Identity Provider for Machines (IdP) is distributed to enhance resilience and security, managing machines in hybrid environments without relying on external credential providers. This flexibility ensures that Corsha can integrate smoothly into diverse IT infrastructures.
Seamless Integration
Deploying Corsha involves requires no code changes. The original client request is automatically wrapped with an MFA token, ensuring that communication remains protected without the need for API clients or services to be aware of Corsha’s presence. This seamless integration minimizes disruption and simplifies the adoption process.
DevOps Integration
Corsha Authenticator can be integrated into your DevOps pipeline, automating machine trust management. Newly deployed machines will start with the Authenticator installed, ensuring that all API requests are protected by MFA and establishing a root of trust. This integration supports a streamlined DevOps workflow while maintaining high security standards.
Zero Trust Compliance
Corsha enforces Zero Trust principles for machine communication, blocking requests from untrusted sources. Our platform satisfies Zero Trust controls for non-person entities (NPE) communication and can operate standalone or integrate with third-party tools. This adherence to Zero Trust principles strengthens overall security posture by ensuring that only verified and trusted machines can interact with your systems.
Automated Certificate Rotation
Corsha manages client certificate rotation, providing an additional layer of security for long-lived or rarely rotated credentials. This automated process protects against the reuse of stolen credentials and ensures continuous security for your systems. By regularly updating certificates, Corsha helps maintain the integrity of your authentication mechanisms.
Simplified Third-Party Protection
Corsha simplifies the protection of third-party applications without requiring code changes. By acting as the mandatory entry point for all third-party traffic, Corsha ensures that only trusted machines you control can access your services. This approach streamlines third-party integration while maintaining robust security.
Detailed Audit Trails
Corsha maintains comprehensive audit trails of all communication to critical APIs, tracking both successful and failed requests from any machine. This detailed logging can be streamed to audit tools, providing maximum visibility and facilitating thorough security reviews. The ability to track and analyze these logs enhances overall security monitoring and incident response.
Comprehensive Access Logging
The Corsha Gatekeeper monitors all communication to your key systems, logging access attempts from both trusted and untrusted machines. This data can be streamed to log aggregation tools or SIEM/SOAR environments for security and audit purposes. Comprehensive access logging ensures that you have full visibility into machine interactions with your APIs, aiding in the detection of anomalies and potential threats.
Observability and Discovery
Corsha emphasizes observability and discovery as integral components of its platform. Our system provides a spectrum of trust, ensuring that only verified and trusted machines and identities can access your NHIs. By leveraging true and patented MFA for APIs, Corsha enhances security and minimizes the risk of credential misuse, while maintaining a clear view of machine interactions.
Full Lifecycle Management
Corsha offers full lifecycle management for NHIs, supporting both legacy and modern ecosystems without requiring code changes. Our agentless platform ensures easy adoption over time and enables connectivity between OT and IT systems. This comprehensive management approach simplifies the administration of machine identities and enhances security across diverse IT environments.