Security is a critical consideration when integrating external services and data sources with your Prisme.ai environment. This page outlines the security architecture of the Apps Marketplace, explains how credentials and data are protected, and provides best practices for secure integration management.

Security Architecture Overview

Prisme.ai’s Apps Marketplace is built with a security-first approach that protects sensitive information while enabling powerful integrations:

Isolated Execution

Apps run in isolated environments with controlled access to resources

Encrypted Credentials

Authentication details are encrypted at rest and in transit

Granular Permissions

Fine-grained access controls determine who can use which apps

Audit Logging

Comprehensive logging of all app installation, configuration, and usage

Credential Management

The Apps Marketplace includes a secure credential management system that protects authentication information:

1

Encrypted Storage

All credentials (API keys, passwords, tokens, etc.) are encrypted using industry-standard algorithms before being stored

2

Secure Access

Credentials are only accessible to authorized services and users with appropriate permissions

3

No Plain Text Display

Credentials are never displayed in plain text after initial entry, even to administrators

4

Automatic Rotation

Support for automatic credential rotation based on policies or schedules (for compatible services)

5

Centralized Management

Unified interface for managing all integration credentials across the organization

Data Protection

When apps process and transfer data, several protective measures ensure security:

Access Control Model

The Apps Marketplace implements a comprehensive access control model:

Organizations can control which apps can be installed:

  • Allow or block specific apps
  • Require approval for installation requests
  • Limit installation capabilities to specific roles
  • Create allowlists of approved apps

This ensures that only authorized and approved apps are introduced into the environment.

Integration Risk Assessment

When adding new integrations, Prisme.ai helps organizations assess and mitigate risks:

1

Initial Assessment

Evaluate the security posture of the service being integrated:

  • Review security certifications and compliance
  • Assess data handling practices
  • Consider the sensitivity of data being exchanged
2

Permission Scoping

Define the minimum permissions required:

  • Use the principle of least privilege
  • Request only necessary access scopes
  • Limit data access to what’s essential
3

Implementation Review

Validate the security of the implementation:

  • Review authentication mechanisms
  • Verify data handling practices
  • Check for appropriate error handling
4

Ongoing Monitoring

Continuously assess integration security:

  • Monitor for unusual activity
  • Regularly review access and usage
  • Update configurations as needs change

Security Best Practices

Follow these recommendations to maintain the security of your app integrations:

App Approval Workflow

For organizations requiring strict control over app usage, Prisme.ai provides a configurable approval workflow:

1

Request Submission

Users request access to specific apps, providing business justification

2

Security Review

Security teams assess the risks and appropriate controls

3

Approval Decision

Designated approvers review and decide on the request

4

Implementation

Upon approval, the app is installed with appropriate controls

5

Documentation

The approval, including justification and controls, is documented

This process ensures that new integrations are evaluated from a security perspective before being implemented.

Internal Marketplace Security

For organizations maintaining their own internal marketplace:

App Review Process

Establish a formal process for reviewing and approving custom apps

Security Requirements

Define security standards that all custom apps must meet

Secure Development

Implement secure development practices for custom integrations

Regular Assessment

Periodically review and update internal apps for security

Security Features for Common Integration Types

  • Support for modern authentication protocols (OAuth 2.0, JWT, etc.)
  • Automatic handling of token refresh and expiration
  • Secure storage of API credentials
  • Rate limiting and throttling protection
  • Request and response validation

Conclusion

Security is a shared responsibility between Prisme.ai, app providers, and your organization. By following the best practices outlined in this guide and leveraging the platform’s security features, you can safely integrate external services and data sources while maintaining a strong security posture.

Next Steps