The Myrmex agent incorporates a trust model and established cryptographic practices to ensure that only legitimate devices can register and communicate with the Myrmex Security Platform, maintaining data confidentiality and integrity.To ensure that only legitimate devices can register and communicate confidentially with the Myrmex Security Platform, Myrmex Endpoint Security employs a model based on asymmetric key cryptography (RSA 4096 bits), symmetric key cryptography (AES-256-GCM), and secure transport (TLS 1.3). The set of practices and protection layers follows the Zero Trust paradigm, as each device must prove its legitimacy at all times.Below, we detail each step of the Myrmex Agent integration and security process, highlighting the protection mechanisms and applied algorithms.
The first point of contact between the organization and the Myrmex Agent occurs through the installer, which is accompanied by a temporary token valid for 24 hours. This token allows multiple installations during the period, optimizing the onboarding process, but becomes unusable after expiring, mitigating risks of misuse.
Controlled Distribution: The 24-hour validity drastically reduces the risk of unauthorized installations.
Scalable Convenience: Allows the use of a single installer on multiple endpoints, speeding up initial deployment.
Risk Mitigation: If the installer is obtained by third parties, it becomes invalid after the token expires.
After installation, the agent locally generates an RSA 4096 bits key pair, consisting of a public key and a private key. The chosen length provides robust security against computational attacks.
Secure Creation and Storage:
The private key remains on the device, protected by restricted permissions.
The public key is sent to the server for registration and validation.
Benefits of RSA 4096:
Factoring Difficulty: The RSA algorithm relies on the difficulty of factoring large numbers, making it computationally infeasible to break.
Cryptographic Longevity: Maintains its robustness even against future advances in computing power.