Core Concepts

Understanding these fundamental concepts is key to effectively using the Osto platform.

Assets

Assets are your organization’s critical digital resources that require protection. Osto categorizes them as follows:

  • Web Applications: Internal or public-facing applications that must be defended against online threats.

  • Users: Employees, administrators, or external stakeholders who require secure access to your systems.

  • Servers: The core infrastructure that hosts your data, services, and applications.

  • APIs: Application Programming Interfaces that are automatically discovered and secured to protect critical app-to-app communication.

Objects

Objects are reusable configurations that streamline the management of your security policies. They allow you to define a setting once and apply it across multiple rules.

  • Ports: Define how network traffic is permitted to move across your infrastructure (e.g., Port 22 for SSH, Port 443 for HTTPS).

  • URLs: Specify web addresses and paths to control access to specific online content.

  • Applications: Define and protect the software tools and services your organization relies on.

  • Devices: Secure all endpoints across your workforce, from company laptops to IoT devices.

Policies

Policies are the sets of rules that enforce your security strategy across the entire ecosystem.

  • Website Security: A collection of rules designed to block malware, prevent Distributed Denial-of-Service (DDoS) attacks, and mitigate common vulnerabilities like the OWASP Top 10.

  • User Access Controls: Rules that enforce identity verification, role-based permissions, and Zero Trust principles for users accessing resources.

  • Server Protection: Policies that restrict access to sensitive server environments through validated, time-bound workflows.

Last updated