Skip to main content

Security Architecture and Best Practices for Scispot Agent Deployment

Comprehensive guide for IT and security teams on securing Scispot Agent deployments, network architecture, firewall configuration, and compliance best practices

S
Written by Satya Singh
Updated over 2 months ago

Executive Summary

Scispot Agent follows established industry patterns as a leading lab middleware solutions. The agent runs as a background service on customer-controlled infrastructure with outbound-only connectivity to Scispot cloud and optionally to customer-owned AWS S3, requiring no unsolicited inbound internet access.

1. Network Architecture & Firewall Controls

Outbound-Only Connectivity Model

Scispot Agent operates on a zero-inbound-access architecture, consistent with modern lab middleware security practices:

• Required outbound connections:

- Scispot cloud endpoints (HTTPS/443)

- AWS S3 endpoints (HTTPS/443) — only if custom S3 upload is enabled

• No inbound internet access required — The agent initiates all connections; no ports need to be exposed to the internet.

• Optional internal-only services (not internet-exposed):

- Local FTP server (default port 2121) for instrument file transfer

- Local ASTM protocol server (configurable port) for clinical analyzer connectivity

- Both services should be restricted to instrument VLAN/subnet only

Recommended Firewall Configuration

Egress rules (outbound from agent host):

- ALLOW: Agent host → Scispot cloud endpoints (*.scispot.io) : TCP/443

- DENY: All other outbound traffic from agent host [optional, for high-security environments]

Ingress rules (inbound to agent host):

- ALLOW: Instrument IPs (specific subnet/VLAN) → Agent host : TCP/<FTP port>(FTP, if enabled)

- DENY: Internet → Agent host : ALL PORTS

- DENY: User workstation subnets → Agent host : TCP/2121, TCP/<ASTM port> [recommended]

Network segmentation best practices:

• Place agent host in a dedicated instrument connectivity VLAN or DMZ-like segment

• Isolate from general user workstations and administrative networks

• Apply micro-segmentation to limit lateral movement in case of compromise

2. Host Hardening & Access Control

Service-Level Security

The Scispot Agent runs as a Java-based background service:

• Monitoring mechanism: Uses Java WatchService API to detect ENTRY_CREATE and ENTRY_MODIFY events in configured directories with debounce logic

• Service isolation: Runs continuously in the background with no interactive UI requirements

• Process containment: Service should run under a dedicated, non-privileged OS account

Recommended Host-Level Controls

Security Control | Implementation

-----------------|-----------------

Service account | Create dedicated low-privilege account (e.g., 'scispot-agent') with read/write access only to monitored folders and agent installation directory

File system permissions | Restrict monitored folder to agent service account + instrument users only; block other users/groups

Configuration protection | Secure agent configuration files (containing API keys, AWS credentials) with permissions 600 (owner read/write only)

Java Runtime Environment | Install JRE 11 as required; keep updated with latest security patches

Operating system hardening | Apply CIS benchmarks or organizational baseline; disable unnecessary services; enable OS firewall

Anti-malware/EDR | Deploy endpoint protection with exceptions for agent executable/folders to prevent false positives

Patch management | Establish regular patching cadence for OS and Java runtime

Logging & monitoring | Enable OS-level process monitoring and file access auditing for agent activities

3. Authentication & Credential Management

API Key Security

• Scispot API key acts as the primary authentication credential for cloud communication

• Storage: Never store API keys in plaintext in code or configuration; use OS credential stores or secrets management where possible

• Rotation: Establish API key rotation policy (recommended: 90-day rotation)

• Monitoring: Track API key usage via Scispot Glue agent dashboard; revoke compromised keys immediately.

4. Data Flow Security & Cloud Integration

Standard Data Flow (Default)

Instrument → Local folder → Agent (WatchService) → Outbound HTTPS → Scispot Cloud

• Files detected in monitored folder are uploaded via encrypted HTTPS (TLS 1.2+)

• Agent can be configured to automatically delete local files after successful upload (disabled by default to prevent data loss)

• Before enabling auto-deletion: Verify data retention in Scispot cloud or S3; implement backup strategy

Optional S3 Direct Upload Flow

Instrument → Local folder → Agent → Customer AWS S3 Bucket + Scispot Cloud (metadata/logs)

• Dual-upload pattern: Raw files to customer S3, metadata/events to Scispot cloud

• S3 bucket security:

- Enable S3 bucket encryption at rest (SSE-S3 or SSE-KMS)

- Enable S3 versioning for data recovery

- Apply bucket policies to restrict access to authorized IAM roles only

- Enable S3 access logging for audit trail

5. Monitoring, Logging & Incident Response

Agent Health Monitoring

Scispot provides a centralized agent dashboard in Glue to monitor agent status:

• Real-time connectivity status

• Last-seen timestamp

• File upload success/failure rates

• Remote agent configuration updates

Your security team should:

• Integrate agent status into SIEM or monitoring platform via API (if available)

• Set up alerts for agent disconnection >15 minutes

• Monitor for unusual upload volumes or file patterns

Logging Strategy

Agent-side logging:

• Enable verbose agent logging (if available in configuration)

• Rotate logs regularly to prevent disk exhaustion

• Forward logs to centralized log management (Splunk, ELK, etc.)

Cloud-side logging:

• Review Scispot cloud audit logs for agent API activity

• If using S3: Enable CloudTrail data events and S3 access logs

• Retain logs per organizational policy (typically 1-3 years for regulated environments)

Key events to monitor:

• Agent authentication failures or API key rejections

• Unusual outbound connection attempts

• File upload failures or repeated retries

• FTP/ASTM server authentication failures

6. Regulatory & Compliance Considerations

Validation & Change Control

Following FDA 21 CFR Part 11, EU Annex 11, and ISO 17025 practices:

• Installation Qualification (IQ): Document agent installation, configuration, and network setup

• Operational Qualification (OQ): Test file upload, FTP/ASTM connectivity, S3 integration

• Performance Qualification (PQ): Verify end-to-end data flow with representative instrument files

• Change control: Scispot agents support remote updates via Glue; establish change control process for agent version upgrades; test in non-production environment first

Audit Trail

• Scispot cloud maintains audit logs of agent activity (uploads, configuration changes)

7. Security Review Checklist for IT/Security Teams

Before deploying Scispot Agent, your security team should:

☐ Validate network architecture: Confirm outbound-only connectivity; document firewall rules

☐ Review credential management: Approve API key and AWS IAM credential storage/rotation policies

☐ Define network segmentation: Place agent in instrument VLAN; restrict lateral movement

☐ Establish logging & monitoring: Configure SIEM integration and alert thresholds

☐ Create incident response plan: Document procedures for API key compromise and host breach

☐ Validate change control: Test agent update process in non-production environment

☐ Document system validation: Complete IQ/OQ/PQ for regulated environments

Did this answer your question?