5 Cross-Cutting Requirements

This section will highlight important requirements or describe any additional cross-cutting requirements that apply to this Building Block.

5.1 Requirements

The cross-cutting requirements described in this section are an extension of the cross-cutting requirements defined in the architecture specification document. Any implementation MUST adhere to all requirements from GovStack Security Requirements.

5.1.1 Use de-normalized databases (REQUIRED)

There are two main reasons for using denormalized databases instead of traditional normalized databases. First, to significantly improve the performance of read queries. This is highly important as databases of the Messaging Building Block will be under a heavy load of requests that in many cases are expected to respond near real-time. Second, to be able to export the content of databases in the format of time-series databases (see below for its reasons). To achieve this, using "UPDATE" and "DELETE" queries in SQL commands SHOULD be disabled. If not, they MUST be avoided by developers and caught by automated tests if still used.

By having this capability, it is possible to delete the content of processed data from production-level server databases right after they have been securely archived. This is important to reduce the impact of potential data breaches by security incidents of potentially N number of application servers hosted by different parties.

5.1**.3 Time-series databases should be convertible to ready-to-use relational databases and vice versa (RECOMMENDED)**

If done so, using archived datasets, either fully or partially, allows to recover and/or re-engineer lost databases (or just datasets of interest) automatically and in a matter of seconds if such pipelines have been predefined. Also, by converting the content of relational databases into a format of time-series databases, these purely text-based datasets are easily usable by different kinds of databases, analytics tools, etc., not just by the relational database used at first.

5.1**.4 Implement using stateless and horizontally scalable components (REQUIRED)**

Technical components (with the exception of relational databases) must be stateless in the sense of the Service statelessness principle.

At least on the level of active-passive nodes based on the principle of "eventually consistent". Pending: initial state for all messages waiting to be queued.

Queued: messages that are in the queue to be sent.

Sent: messages with proper confirmation that was sent to the provider.

Delivered: messages with proper confirmation that was delivered to the end-user.

Errored: messages with an error during delivery.

Failed: messages that are errored and we gave up sending.

5.1**.6 Messaging as a service must be vendor-neutral (REQUIRED)**

If Messaging Building Block protocols are followed, the technical stack used to provide messaging as a service is vendor-neutral, meaning that anyone is free to use technical solutions of their own choice.

5.1**.7** Only allowed participants can join the network (REQUIRED)

Only allowed participants are allowed to provide and use the services of Messaging Building Block.

5.1.8 Do not store users' contacts and readable messages at Messaging Building Block (REQUIRED)

Messaging Building Block is a dumb messaging proxy that gets all of its relevant input from its clients. This also includes the names and contact information of all relevant participants. Such sensitive information may not exist in its raw and/or re-engineerable form nor in databases or logs.

5.1**.9 Message content must be readable only by intended participants (REQUIRED)**

Depending on the specific use case, this may mean end-to-end encryption or SNI routing.

5.1**.10 Audit logs must be provided (REQUIRED)**

Every instance of a service must generate audit logs containing information about all of its actions regarding timestamps, related parties, identifiers to operations performed, and HTTP response codes for any given action. Audit logs may not contain the actual content of the message. Audit logs must be in a time series database format. Audit logs must be accessible by a given endpoint by the central service provider only. Audit logs should be periodically removed from their original source after a defined period of time.

5.1**.11** Secure API exposure (REQUIRED)

All APIs are exposed via secure socket connections (HTTPS).

Manage access quotas and throttling.

5.1**.13 API calls** (REQUIRED)

Logging of all API calls made.

Allow API providers to limit the rate of consumption for all API users.

5.1**.15 S**tandardized backend error messages (REQUIRED)

Transform backend error messages into standardized messages so that all error messages look similar; this also eliminates exposing the backend code structure.

5.1**.16** Minimal data for requests (REQUIRED)

Contact address (email, phone number, etc.), the message type, the content of the message, and the initiating source’s unique transaction ID.

5.1**.17** Messaging processing (REQUIRED)

Asynchronous messaging processing. OpenAPI specifications for calling this function; resource models and data structures, internal and external interfaces.

5.1**.18** Stateless architecture (REQUIRED)

Stateless architecture.

Message broker tool to enable performant queueing mechanisms such as RabbitMQApache/Kafka, or GRPC for data transfer speed purposes.

5.1**.20 U**nstructured DATABASES (REQUIRED)

Databases with unstructured data should be treated with Elasticsearch/Logstash.

End users should be registered as Message queue clients/subscribers in the Messaging Building Block. Subscription is required to receive a message.

In order to prevent single points of failure, messages must be replicated on at least 2 different service providers. In case of message replication, all unprocessed replicated messages must be kept track of and relevantly updated in order to prevent re-processing them.

5.1**.23 Support policy configuration (REQUIRED)**

Admin of the room must be able to choose the policy profile with the configuration of the message provider, e.g. retrial frequency.

5.1**.24** Support queuing mechanism (REQUIRED)

Unsent and unsuccessfully delivered messages must remain in a queue until being successfully delivered or otherwise permanently processed.

5.1**.24.1 Messages Delivery Statuses**

Pending (initial state for all messages waiting to be queued); Queued (messages that are in the queue to be sent); Sent (messages with proper confirmation that was sent to the provider); Delivered (messages with proper confirmation that was delivered to the end-user); Errored (messages with an error during delivery); Failed (messages that are errored and we gave up sending).

5.1**.24.2** Delivery business rules

Messages not delivered in a period of 24 hours (any errored or queued messages more than 24 hours old must be labeled as failed and go out of the queue); Messages retrial (Errored messages must be retried for 24 hours).

5.1**.25** Client application authorization tokens (REQUIRED)

Client applications must send authorization tokens in the authorization header of the request to authenticate users and the API Management Gateway will verify whether the token is valid.

5.1**.26** Input validation checks (REQUIRED)

Perform input validation checks to prevent oversized message attacks, SQL injection attacks as well as JSON and XML threats.

5.2 Standards

The following standards are applicable to data structures in the Messaging Building Block:

5.2.1 REST API

All services are provided as REST API requests

5.2.2 extension-compatible requests

Only Transport Layer Security (TLS) Server Name Indication (SNI) extension-compatible requests are allowed

5.2.3 REST APIs

REST APIs calls and responses use JSON as the only allowed data format.

5.2.4 ISO 8601 (REQUIRED)

Using ISO 8601 on dates and times

5.2.5 UTF-8 (REQUIRED)

UTF-8 character encoding on text input

Last updated

Copyright © 2024