Skip to main content
Grand Central iPaaS uses a network architecture split between Azure tenancies with public and private networking components to establish secure boundaries.

Network architecture

The platform operates across two Azure tenancies and the customer’s backend:
ComponentDescription
BaaS TenancyHosts WAF and AKS for the EBP client interface
GC TenancyContains the platform runtime within a private VNet protected by NSGs
Customer BackendCustomer systems of record, either on-premises or cloud-based

Service mesh (Istio)

All application traffic is managed by Istio, providing:
  • Mutual TLS (mTLS): Encryption between services is enabled by default.
  • Traffic management: Fine-grained routing, load balancing, and failover.
  • Observability: Distributed tracing and metrics collection without code changes.

Egress controls

Outbound traffic from the cluster is restricted by default. To allow applications to communicate with external APIs, you must explicitly define:
  • ServiceEntries: Declare external services that applications can access.
  • Egress Gateways: Route outbound traffic through controlled exit points.
This ensures data does not leave the secure perimeter without authorization.

Ingress and egress flow

Internal ingress (EBP client)

Traffic from the EBP client interface connects via Azure PrivateLink:
EBP Client → PrivateLink → Private VNet → AKS Runtime
This path stays entirely within Azure’s backbone network with no internet exposure.

External ingress (Fintech / Open Banking)

External traffic traverses multiple security layers:
LayerFunction
1. Secure boundaryVPN or TLS/mTLS with NACL for source validation
2. WAFOWASP protection, threat inspection, traffic filtering
3. API ManagementPolicy enforcement, credential management, rate limiting
4. Internal NSGsNetwork-level filtering and segmentation
5. AKS clusterWorkload-level security policies within private VNet

Egress flow

Outbound traffic to customer backends flows through:
LayerFunction
1. AKS runtimeInitiates connection from private VNet
2. Internal NSGsEnforce egress policies and validate destinations
3. NAT GatewayProvides consistent outbound IP and filtering
4. Customer backendConnects via PrivateLink, VPN, or TLS/mTLS

Connectivity options

Grand Central supports three primary connectivity options: Best for: Azure-to-Azure connectivity, cross-region integrations
AttributeValue
Internet exposureNone
LatencyLow (Azure backbone)
MaintenanceLow
Use separate endpoints for ingress and egress traffic with complete Azure backbone isolation.

Site-to-Site VPN

Best for: On-premises connectivity, initial go-live, smaller branch connections
AttributeValue
Internet exposureEncrypted tunnel over internet
LatencyVariable
MaintenanceModerate
Quick setup with encrypted IPSec tunnels. Performance depends on internet conditions.

Internet connectivity

Best for: End-user traffic, third-party services, public APIs
AttributeValue
Internet exposureFull
LatencyVariable
MaintenanceHigher
Requires IP allowlisting or mTLS. Maximum flexibility with higher operational overhead.

Azure ExpressRoute

Best for: High bandwidth, low latency on-premises connectivity For mission-critical workloads requiring dedicated connectivity:
  • Direct connection from cloud to on-premises infrastructure
  • Site-to-Site VPN as failover
  • PrivateLink for cloud backbone connectivity

Web Application Firewall

Staging and UAT runtimes are protected by Azure Application Gateway with WAF enabled in Prevention mode. This shields APIs from common web vulnerabilities including OWASP Top 10 attacks.

Private connectivity

Critical infrastructure components access Azure services via Private Links:
  • Azure Key Vault
  • Azure Storage Accounts
  • Azure Container Registry
This ensures traffic stays on the Azure backbone network and is never exposed to the public internet.

Security controls summary

LayerControls
IngressWAF, DDoS protection, IP filtering (NACL), mTLS
API ManagementOAuth/OIDC, rate limiting, circuit breakers
Runtime (AKS)Kyverno policies, namespace isolation, Istio policies
EgressPrivateLink, VPN, NAT Gateway, mTLS

Next steps