Always be confident that your properties are 100% compliant with your network standards.
Stella options
Stella functionality is available via four independent modules – Discovery, Compliance, Configuration and Monitoring, which are orchestrated by Stella Central to create a horizontally integrated control platform to provide independent network visibility, configuration management and risk identification.
Stella
Stella
Compliance
Stella
Configuration
Stella
Monitoring
Stella
Central
Stella Security
Security is a principal concern at Stella, so we take a multi-layered approach to security for the Stella Relay.
The Stella Relay is a single-purpose device
The Stella Relay is built specifically as simple jumping points for securely accessing your network with no additional functionality. Each Relay is provisioned with unique credentials and can only be used with the target network.
All access to the Stella Relay is over encrypted links
Each Stella Relay calls home and connects to a secure network using unique credentials via encrypted VPN links and wait for instructions. Instructions and all results are transported using SSH connections over the VPN tunnel.
All Stella Relays are isolated
Stella Relay can only access the Stella VPN servers and are not accessible outside of the VPN link. Communication between Stella devices is blocked and actively monitored.
The Stella Relay doesn't keep your data
All Stella Relays use encryption and temporary storage to ensure your data is secure. Stella Relays purge details such as the configuration of your network, compliance tests, and logs after each round of testing, ready for the next run.
Humans need not apply
The Stella Relay can only be accessed by our automation platform.
Independently Verified
Bright Star (the owner of Stella) is SOC 2 compliant with semi-annual reviews documented in our Trust Center. Also, independent security specialists CyberCX perform comprehensive penetration-testing of Stella software and Relay hardware twice per year.
Built on the shoulders of giants
Like almost every software product, Stella is built on best-of-breed technologies that includes large and mature open-source software projects such as Linux, SSH, Python, Ansible, and OpenVPN.
Supply-chain security is monitored
We automatically monitor the projects and libraries incorporated into Stella to ensure that all security updates are implemented as soon as possible.
Which means, with Stella your attack surface is minimal and resides in AWS best practice security protocols.
Secure by design
Stella does not hold personal or financial information. All services have a minimal attack surface protected by AWS managed services and configured to AWS best practices.