Whitepaper Cubby: A secure solution. A technical overview of Cubby s secure, enterprise-grade infrastructure.
|
|
|
- Hugo Reynolds
- 10 years ago
- Views:
Transcription
1 Whitepaper A technical overview of Cubby s secure, enterprise-grade infrastructure.
2 Contents Introduction 3 We ve Got Your Back 3 Enycryption 3 Data center security 3 LogMeIn company security policies 4 Tools Under Your Control 4 Track your organization s data 4 Auditing, logging and reporting 4 View cubby contents 4 Data removal and lockout 4 Authentication and Identity 5 Authentication basics 5 Two-step verification 5 Provisioning 5 Additional authentication related security controls 6 Setting security policies 6 Controlling Cubby use via cubby.com 6 Using AppGuru to set Cubby policies 6 Additional features that protect data in cubbies 7 Compliance 7 HIPAA 7 PCI 7 FIPS 8 Other standards 8 Integration with Other LogMeIn Products 8 Conclusion 8 Appendix: A Closer Look at Cubby Cryptography 8 Encryption of data at rest 8 Encryption of data on computers 8 Encryption of data on mobile devices 9 Encryption of locked cubbies 9 Sharing data 9 Data in motion: Security of shared files 10
3 Introduction Cubby by LogMeIn was built as a secure, enterprisegrade solution for using the cloud in business. With Cubby, your organization can rest assured that all data is secure in transit, at rest or when being shared. Cubby gives you tools to track data, prevent data leakage and comply with security rules and standards. I. We ve Got Your Back LogMeIn is at work behind the scenes ensuring enterprise-grade security. Enycryption How is data encrypted? Who can access keys? Cubby uses SSL to protect data in transit. Data stored in the cloud is encrypted on disk in a state-of-the-art, secure data center in the USA. The servers and supporting infrastructure belong to LogMeIn and can only be accessed by a small team of system administrators, all of them LogMeIn employees. DirectSync transfers are secured using public/private key encryption on the pipe between computers. Each computer running the Cubby desktop application is assigned a private key that never leaves the computer. This guarantees that no one can see what s being transferred between your computers via Cubby. Tip: For extra assurance that nobody can see your sensitive files without authorization, try Cubby Locks, available with an enterprise or pro subscription. With Cubby Locks, not even LogMeIn can see unencrypted data, and only you have access to the keys. For a detailed technical discussion of Cubby encryption, see Appendix: A Closer Look at Cubby Cryptography. Data center security Where is the data center? How is it protected? Cubby data is stored at LogMeIn s proprietary data center in Ashburn, Virginia, United States that uses a highly redundant server infrastructure. The Ashburn site is SSAE SOC-1 Type II certified. SSAE SOC-1 Type II audits minimize the need for multiple sets of auditors to separately examine the same set of controls that govern a third party s services. SSAE Type II service-auditor reports include the same data as Type I reports (i.e., the service auditor s opinion on the fairness of the provider s description of its controls and how well they re designed to meet specified control objectives), as well as the auditor s opinion on the effectiveness of the controls during the period under review. The data center uses a wide variety of security equipment and procedures to control, monitor, and record access to the facility, including customer cage areas. Physical design features. Data centers use windowless exteriors for colocation and floor areas. Security systems have dedicated uninterruptible power supply systems and standby emergency power (generator) support. State of the art security monitoring. All areas of the center, including cages, are monitored and recorded using closed circuit television (CCTV) and access points are controlled. The alarm monitoring/intrusion detection subsystem monitors the status of various devices associated with the security system, such as alarm contacts, glass breakage detectors, motion detectors, and tamper switches. Systems to prevent intrusion. Cage security is provided through three levels of access control: hand geometry readers at the cage entrance, keyed locks at each cage, and if the cabinet is located in a sharedcage environment, the cabinet door includes a selfpowered, keypad-activated lock. Access histories can be downloaded through a data-port and are available to the customer for auditing purposes through SmartHands. Additional cyber security controls are in place. For example, analysts from LogMeIn s Network Operations Center team monitor data center logs for potential threats. Cubby network architecture is comprised of three security zones, with limited access between them. This ensures that only authorized personnel are able to transit or interact within each of the different network zones. These network zones consist of Public, Private, and ILO (Integrated Lights Out) network zones. ILO is connected to all servers through dedicated admin servers. Additional information about infrastructure security, redundant systems, monitoring and alerting mechanisms, physical access to data centers, troubleshooting, and failover is available under non-disclosure agreement. 3
4 LogMeIn company security policies Is data safe from LogMeIn employees? Both LogMeIn and the Cubby team are committed to maintaining the security of user information. International Privacy Protection. For personally identifiable information collected from users in the European Economic Area and Switzerland, LogMeIn adheres to the Safe Harbor Principles administered by the U.S. Department of Commerce. Information Sharing and Disclosure. LogMeIn does not transfer personal information to third parties, except when required to do so by law or in the good faith belief that such action is necessary to conform to the law, protect and defend LogMeIn s rights or property, act in urgent circumstances to protect employees or users or members of the public, or to effect a transaction/ restructuring/proceeding that transfers to a third party the assets or line of business to which the information pertains. Users may opt-out of receiving promotional materials at any time. Cubby Locks for extra assurance. Cubby Locks gives you extra assurance that nobody can see your sensitive files without authorization. For technical details, see Encryption of Locked Cubbies below. II. Tools Under Your Control We give you the tools you need to make Cubby as secure as you want it to be. Tracking your organization s data Auditing, logging and reporting The activity log provides insight into user activities and helps monitor data loss and leakage. Events captured in the log show what content is being shared, how, and with whom. If it s necessary to investigate specific policy breach or threat, administrators can filter events by employee, event type, or date. Tracked events include the following: When a cubby is shared Whether a share is accepted or declined When a cubby is deleted When content is permanently deleted from a cubby If archived versions of information are removed from a cubby When a user leaves a shared cubby When public links are created When a cubby is synced to a device When a wipe is initiated and completed When a device is removed from Cubby View cubby contents The team leader of an enterprise account can view the actual content of team members cubbies that have not been locked. Data removal and lockout Team leaders can wipe team members data in two ways: By suspending a user and wiping all data from their local devices, or by keeping the user active and wiping data from selected devices. Users themselves can wipe data from their own local devices. Device wipe revokes access to the Cubby application, removes stored passwords, and deletes files that have been saved locally. This functionality is useful if a user s laptop is either lost or stolen or the employee leaves the company. The Cubby application must be online to receive the wipe command. Once the wipe command has been received, synced files are deleted. When wiping a mobile device, a user s access to the Cubby app is revoked and all files saved for offline access are deleted. Although end users and IT administrators can both use device wipe, it s important to note that end users can only wipe their own devices and synced data, while administrators can wipe devices and synced data belonging to anyone in their organization. Under the Hood: Mobile device wipe Under normal circumstances, when users log into the Cubby service via the Cubby mobile app, that device gets a unique client ID. Mobile devices communicate with the Cubby.com website through API URLs. The client ID is always appended to the API call to identify caller devices. When a user invokes mobile device lockout, however, the client ID is invalidated. When the Cubby mobile app initiates an API call to the Cubby.com website, the mobile app detects that its client ID was removed from the system. In response, the mobile app resets its state and all Cubby files stored on the mobile device are deleted. 4
5 Authentication and Identity How do users authenticate? How are accounts protected? Authentication basics When a user creates a Cubby account they are utilizing the Common Login Service, LogMeIn s authentication service for most LogMeIn products, to create a LogMeIn ID (username and password combination). Users are required to create passwords that are between six and 255 characters in length. Administrators are also allowed to set up domain verification and let users log in with their enterprise credentials. Cubby allows four consecutive login attempts. If invalid login information is provided, the system will show an incorrect username and password message. Upon the fifth failed attempt, a CAPTCHA validation is required. If users forget their password, they can request a forgot password link which is valid for a 24-hour period. Requests for forgot password and change links can only be sent once per hour. For accounts with locked cubbies, users should reset their password by providing their unique Recovery Key, otherwise they lose all data in locked cubbies. Users can elect to remain logged in by selecting the keep me logged in option. Sessions will time out after 20 minutes. Two-step verification By enabling two-step verification, users can add extra security to their Cubby account. Without this functionality, anyone who knows a user s password can access their data. Once two-step verification is set up, the cubby.com login procedure changes: After entering their LogMeIn ID and password at cubby.com, users are also required to enter a one-time code that they get from either a paired mobile authenticator app or via . Users can turn off two-step verification at any time. Note: The Cubby/WebDAV integration does not support two-step verification. Active Directory Integration IT administrators can enforce domain credentials for users by configuring ADFS. By configuring ADFS for LogMeIn, Cubby, and join.me authentication, members of your organization will be able to log in to LogMeIn.com, cubby.com, and join.me using their corporate AD credentials. Users will not need to create a unique LogMeIn ID since their domain ID serves that purpose. Once configured, ADFS becomes the exclusive authentication method for your domain, which gives you complete control over who can access LogMeIn.com, cubby.com, and join.me. The result is a secure authentication methodology that simplifies and automates the sign-in process for your users. When a user enters an address with a valid domain, the LogMeIn Common Login Service recognizes the address and prompts the user to log in with their domain credentials (that is, the same and password they use to log on to your network). AppGuru and Active Directory Enterprise customers can also use AppGuru by LogMeIn to provision and manage Cubby access with Active Directory. By entering your domain admin credentials when prompted by the AppGuru Client, users, groups and organizational units from Active Directory will automatically populate AppGuru s cloud directory. Users, including specific groups and roles setup in Active Directory, can be easily provisioned and de-provisioned to Cubby when they leave the company. AppGuru also handles license management and shows how many cloud application licenses are currently in use by employees. The integration between AppGuru and Cubby has been architected to ensure that user information remains secure. User authentication for both AppGuru and Cubby is provided by the LogMeIn Common Login Service (CLS). Key points include the following: The CLS provides an internal API which verifies the identity of the logged in user. The API is only available to LogMeIn applications. API calls to the CLS are made over HTTPS. All HTTPS traffic uses 128-bit encryption. With every HTTPS call, the caller verifies the identity of the server. AppGuru provides a security token for every request. The Cubby API uses this token to identify users. 5
6 Additional authentication related security controls Once users are logged into Cubby, they can modify additional security controls which include: Changing their LogMeIn ID Changing their password Configuring who receives notifications about account changes Configuring which account changes will trigger a notification -- For example, upon failed login, upon successful login, or when notification settings change -- Note: Account owners are always notified if the or password associated with the account is changed Setting security policies How can the use of Cubby be controlled? Controlling Cubby use via cubby.com Using management features available on the cubby.com website, administrators can ensure that corporate security requirements are met, prevent accidental sharing of documents and files, and reduce the overall organizational risk associated with mobile and distributed teams. Through Cubby Enterprise, there are several Cubby policies that can be configured to prevent data leakage. For example, IT administrators can enable or disable: Access to Cubby on cubby.com and via mobile devices Access Cubby on a mobile device without a passcode The ability to sync and store data on devices Creation of cubbies Sharing cubbies and re-sharing cubbies Accepting shares from individuals outside the organization The ability to create public links and grant access to them outside the team Using AppGuru to set Cubby policies AppGuru allows an administrator to set policies for individuals, groups of users, or an entire organization. While the actual permissions are the same as on the web site, AppGuru gives a finer level of control when compared to the cubby.com management interface because AppGuru allows users to be arranged in policy groups. Invite others to a cubby they own Share with anyone or only with people within your own domain Invite others to a cubby owned by someone else Accept shared cubbies from people outside the organization Create Internet links that anyone with the link can access Create Internet links that can be accessed from within your domain 6
7 Additional features protecting data Cubby Locks Cubby Locks gives you extra assurance that nobody can see your sensitive files without authorization. Once a user locks an individual cubby, all content within the cubby is held encrypted and they need to enter their password to access or share it. They receive a special code called a Recovery Key. Should they forget their password, they must provide the Recovery Key to regain access to the locked cubbies. Please note that users are able to change their password without a Recovery Key; the Recovery Key is only required when resetting a lost or forgotten password. For a detailed technical discussion, see Encryption of Locked Cubbies in the appendix. Restore Deleted Files When a user syncs files with the cloud, all revisions are archived. Users can restore a file that they may have deleted from their local computer or mobile device. Mobile Passcode Mobile passcodes give an extra security layer in case a phone or tablet is lost or stolen. Mobile passcode is supported for ios and Android operating systems. This functionality enforces the use of a mobile passcode to unlock the phone; otherwise the system denies access to the Cubby application. It is important to note, however, that mobile passcodes do not prevent access to files that are saved on a mobile device if the passcode is bypassed or compromised. To prevent access to files, users can wipe their devices from the Cubby website, under the Devices tab. The next time the Cubby application is opened on the device and the device has an Internet connection, Cubby will recognize that it was removed from the devices list and all locally saved files and data will be deleted. To enable a mobile passcode, users enter a four digit number. The passcode is not stored in plain format. For ios, a derived value is saved in the keychain (secured storage of ios). For Android, a derived value is saved in the private preferences. Users can set parameters which determine what delay time is acceptable to skip the password window. If the Require immediately option is set, then the passcode must be entered whenever Cubby starts from the background. If the Require immediately option is turned off, the user only has to enter the passcode if the application was closed more than 15 seconds ago. At any time, Cubby users can change their mobile passcode or turn the functionality off (for enterprise users, only if allowed by an administrator). If users fail to enter their current passcode, an error message appears and a counter which shows how many failed attempts occurred in a row. This counter will only be reset when the user enters his or her passcode successfully. After five failed attempts, the user is logged out from the Cubby application and locally saved files, settings, and data are wiped out. III. Compliance HIPAA When used and configured properly, the technical security features employed by Cubby satisfy the technical and physical security safeguards required by HIPAA. As a result, Cubby users can confidently incorporate Cubby into their information-management system without affecting their HIPAA compliance. Providing a managed sync/share solution for your employees also helps ensure that data is not being sent to unauthorized tools that are not being monitored by IT. LogMeIn encourages Cubby users who plan on stating and sharing Protected Health Information through Cubby to review these security features and consider their specific use case to ensure they properly configure their Cubby in order to achieve compliance with applicable HIPAA-mandated administrative, technical and physical security safeguards. Also, make full use of the logging and monitoring features within Cubby to ensure it is being used properly to meet your compliance needs. PCI Cubby users can confidently incorporate Cubby into their information-management system without affecting their PCI compliance. Cubby servers protect all information transmitted with full, end-to-end 256-bit SSL encryption, the same encryption method endorsed by MasterCard, Visa and American Express. Cubby further supports PCI compliance efforts by providing centralized user management and two-factor authentication and by implementing strict information security policies as detailed herein. 7
8 FIPS Cubby servers utilize FIPS-validated cryptographic modules provided by Microsoft but do not force the use of cryptographic algorithms that are FIPS 140 compliant or in compliance with FIPS-approved modes of operation. LogMeIn does not provide cryptographic products or components; therefore LogMeIn itself cannot apply to receive a FIPS 140 security level rating or validation. Other standards Feel free to contact your LogMeIn representative for assistance with other standards or compliance concerns. IV. Integration with Other LogMeIn Products Cubby security for join.me customers LogMeIn s join.me online meetings and collaboration product is integrated with Cubby. This integration enables users to store meeting recordings in a cubby. In join.me, Cubby public links are visible and serve as the means for accessing meeting recordings. Security is handled using the Cubby infrastructure, encryption, and data processing. It s important to note the following: join.me uploads meeting recording to Cubby using the Cubby Web Distributed Authoring and Versioning (WebDAV) interface. WebDAV is an extension of the Hypertext Transfer Protocol (HTTP). In the context of join.me and Cubby, however, the WebDAV interface uses an HTTPS based secure channel. As information is uploaded and downloaded, it uses the same flow as WebDAV. This includes encryption, key management, authentication, and authorization. Cubby public links that appear in join.me are managed using a Cubby API. Users are authenticated when they log into join.me. When join.me users save meeting recordings in Cubby, the same single sign-on information is used. As a result, users do not have to enter their login credentials again in order to store meetings in Cubby. Cookies. The Cubby website uses cookies to track user traffic patterns. This information is used to determine the usefulness of the website information to users and to see how effective the navigational structure is in helping users reach that information. V. Conclusion LogMeIn and Cubby strive to prevent data leakage through a holistic, but flexible view of security. In addition to the benefits associated with Cubby s robust data center infrastructure, IT administrators and individual users have the flexibility to configure security policies that best meet their individual needs. The Cubby team has created safeguards at each stage of the data lifecycle to ensure that user information is secure. Appendix: A Closer Look at Cubby Cryptography Encryption of data at rest Cubbies are the way users store data at rest in the cloud. All data at Cubby data centers are stored in encrypted form, using an AES-256 symmetric algorithm. The key used in this context is the Cubby Data Key (CDK), which is a cryptographically strong and randomly generated for each new cubby. CDKs are stored in the database, along with other cubby properties. When a user logs into Cubby.com, a web application fetches the CDK from the database. The web application uses the CDK for encrypting and decrypting data when files are uploaded and downloaded from a cubby. A user can choose to provide an extra layer of security to their CDK by using a feature called Cubby Locks. Cubby Locks gives users extra assurance that no one, including LogMeIn employees and third parties with direct access to the Cubby data center, can view their sensitive files. Encryption of data on computers When a Cubby client application is installed, the computer generates an RSA key called the Host RSA Key (HRK) and a symmetric key called the Host Symmetric Key (HSK). HRK is stored in the crypto store / key chain, while the HSK is stored encrypted with the HRK in the Cubby host configuration. The RSA key is used to authenticate the computer to other Cubby computers when connecting through a peer-to-peer tunnel via DirectSync. The private part of the key never leaves the computer. The client application encrypts all files using CDK before uploading them to the cloud. All data downloaded from 8
9 the cloud by the Cubby client application are decrypted using the CDK before being written to local storage. CDK is deployed when a cubby is synced to a local computer. If the cubby in question is a standard (not locked) cubby, then CDK is simply read from the central database. If the cubby is locked, then the user must enter their LogMeIn ID password to decrypt the CDK from the central database. User password USK (User Symmetric Key) URK (User RSA Key) (private) CDK For both standard and locked cubbies, the CDK is then stored in the local computer s cubby.db, encrypted with HSK. When a user decides to stop syncing a cubby to a specific computer, the CDK is deleted from the cubby database file. Computer s user account protected crypto store / key chain HRK (private) HSK CDK Encryption of data on mobile devices Each mobile device is tied to one LogMeIn user account and assigned a DeviceID and Password at the time of the installation. A Cubby app can only be used to access content on the cloud or saved locally for offline access. The CDK is never sent to a mobile device: encryption/ decryption is performed by the web servers in the same way as when accessing the cloud from a browser. When accessing a locked cubby, a LogMeIn ID password must be entered, thus allowing the CDK to be decrypted and temporarily stored by the web servers. The decrypted CDK key remains available on the web servers for 20 minutes and is available to open a single locked cubby. In effect, this means that the user must enter their password once every 20 minutes for each locked cubby they want to access. User password USK URK (private) CDK The CDK is cleared from server memory when the web session is closed or times out. Encryption of locked cubbies Data in a locked cubby can only be decrypted with the user s LogMeIn ID password. This is one reason why Cubby users are prompted frequently for their password and why no one can read data in a cubby without knowing the user s password. It s also important to note that passwords aren t stored by Cubby or any other LogMeIn service. Cubby Locks are based on a cryptographic framework that provides confidentiality for user data stored in the Cubby cloud. Cubby Locks security relates exclusively to data at rest in the cloud and does not make data on devices more secure. Each user with a locked cubby, or who has accepted an invitation to a locked cubby, has a system-generated symmetric key called the User Symmetric Key (USK). The USK is encrypted with the user s password and is stored in AES-256 encrypted form in the database. A 4096-bit RSA key pair is generated called the User RSA Key (URK). The private part of the URK is AES-256 encrypted with the USK and stored. The public part of the URK is stored in plain text. Both the USK and URK are specific to and generated for the user account. The use of asymmetric encryption means that anything encrypted with the public key can only be decrypted with the private key and vice versa. When a cubby is locked, the system encrypts the CDK with the public part of the URK, stores it, and deletes the plain text CDK from the database. This means that every link in the encryption chain is stored in encrypted format in the Cubby database. User password USK URK CDK Access cubby data When a cubby owner locks a cubby, a Recovery Key (RK) is also generated. This is a cryptographically random, 32-character alphanumeric string. There is only one Recovery Key per user and this key must be used if a user forgets their password and resets it. When a Recovery Key is generated, the following occurs behind the scenes: The USK is also encrypted with the Recovery Key using AES-256. Two copies of the USK are stored in the database one that is encrypted with the password and one that is encrypted with the Recovery Key. When the cubby owner locks a second cubby, the system checks for an existing Recovery Key. If found, it is decrypted by the user s password. This is done so the user can be reminded of their existing Recovery Key. 9
10 When a user goes through the forget password process and enters their Recovery Key, the key is used to decrypt the USK, which is re-encrypted with the newly created password. Since the Recovery Key is stored in the database encrypted with the URK, it s only available to view on line after users enter their password. Recovery Key USK URK (private) CDK Access cubby data User password USK URK Recovery Key The required chain of encryption to access a locked cubby is: User password USK URK (private) CDK Access cubby data Sharing data When sharing a cubby with another user, the CDK must be transferred to the share recipient. If the cubby is unlocked, the CDK is stored as plain text in the database, so no action is required. When sharing a locked cubby, the owner enters the password that decrypts the CDK: User password USK.Inviter URK.Inviter (private) CDK If the invitee is an existing Cubby user, then the CDK is encrypted with the invitee s public key and stored in the database. CDK URK.Invitee (public) If the invitee is not a Cubby user, then a temporary key is generated that is sent to the invitee. This temporary key is also used as a key to encrypt the CDK. The hash of the temporary key is stored in the database. When Cubby Locks is turned on for a cubby, all related public links are deleted. Data in motion: Security of shared files File sharing is an essential part of collaboration whether sending files to a cloud-based repository or syncing files between computers. Data transferred between devices and the Cubby cloud is always transmitted over SSL/TLS with all cubbies even those that are not locked. Users can use DirectSync (peer-to-peer) to share information between their own devices or with others without the Cubby cloud. DirectSync relationships are forced between devices and Cubby accounts by turning off the cloud and then sharing a cubby. When using DirectSync, each computer must be powered on and running Cubby to stay in sync. Any computer that was off will start syncing when it is powered on. Cubby always establishes direct UDP connections between clients unless prevented by the firewall or NAT configuration, in which case data is relayed through Cubby data centers using a TCP based, E2E secure SSL tunnel. Computers on the same LAN most likely communicate directly using UDP socket. During DirectSync, SSL/TLS encryption is used and the private portion of the RSA key never leaves the client computer, and is stored in crypto store (keychain). åto prevent the injection of a malicious computer to a cubby, the existence of the proper CDK is validated upon peer handshake. A challenge-response handshake protocol takes place in the background that guarantees that both connecting parties have knowledge of the proper CDK. In the case of locked cubbies, the CDK cannot be obtained without the account password. CDK TemporaryKey When the new user registers, the Temporary Key from the invitation link is validated against the hash in the database, and then the temporarily encrypted CDK is deleted from the database and encrypted with the newly generated public key of the invitee. A USK will be generated in all cases when the user does not have a USK (for example, new users). 10
11 Figure 1: Overview of the key hierarchy Quick Reference: Cubby Security Keys TPDK (Temporary Password Derived Key) USK (User Symmetric Key) 256-bit AES key A symmetric key that is generated when a user first logs into Cubby[mz3] The USK is encrypted with the user s password and is stored in AES-256 encrypted form in the database URK (User RSA Key) A 4096-bit RSA key pair The private part is encrypted with the USK and stored The public part is stored in plain text Asymmetric encryption dictates that anything encrypted with the public key can only be decrypted with the private key and vice versa Not to be confused with RK (Recovery Key) described below CDK (Cubby Data Key) 256 bit AES key A key that is randomly generated for each new cubby Used for encrypting and decrypting data when files are uploaded to and downloaded from a Cubby RK (Recovery Key) 256 bit key Randomly generated key, used in case of forgotten password 11
12 Notations Notation E(K,m) D(K,c) A B m_k H(K,m) H(m) Kx Sx Nx X Definition Encryption of the m plain-text message using K key Decryption of c ciphertext message using K key Concatenation of operands A and B Encrypted version of m plain-text message, encrypted with K key Keyed hash of m plain-text message using K key Hash of m plain-text message Cryptographic key, assigned to the x entity Cryptographic salt, assigned to the x entity Cryptographic nonce, assigned to the x entity Value x is loaded from storage. +K Public Asymmetric Key -K Private Asymmetric Key K Symmetric Key KDF(m,p) Key Derivation Function, performed on the m message with p parameter tuple The Cubby Locks Engine handles encryption key generation, management and disposal. Key Generation. This is performed using standard software-based (OS/.Net API) random number generator algorithms. These have been designed to provide sufficient entropy for cryptographic purposes. Key Management. For key management, the Cubby Locks Engine uses symmetric ciphers to encrypt large amounts of data. Asymmetric cryptography is only used when working on cryptographic keys with a limited size. Key Disposal from memory. When locked cubbies are handled, no encryption keys are stored together with the encrypted material. During operation, certain keys have a limited lifetime within the memory and are disposed of as soon as possible. Keys are removed from memory using the services of the underlying operating system. Key Disposal from database. When stored keys are disposed of, database records are updated to reflect key removal. When a cubby is locked, the system encrypts the CDK with the public part of the URK, stores it, and deletes the plain text CDK from the database. All rights reserved, LogMeIn Summer Street, Boston, MA cubby.com
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
join.me architecture whitepaper
join.me architecture whitepaper 2 join.me architecture whitepaper Table of Contents Introduction 3 Architecture Overview 3 Data Security 6 Session and Website Security 7 Hosting Overview 8 Conclusion 8
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
LogMeIn HIPAA Considerations
LogMeIn HIPAA Considerations Contents Introduction LogMeIn HIPAA Considerations...3 General HIPAA Information...4 Section A Background information on HIPAA Rules...4 Technical Safeguards Overview...5 Section
Security Whitepaper. NetTec NSI Philosophy. Best Practices
Security Whitepaper NetTec NSI provides a leading SaaS-based managed services platform that to efficiently backup, monitor, and troubleshoot desktops, servers and other endpoints for businesses. Our comprehensive
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
ShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
LogMeIn Rescue Architecture
A technical overview of s architecture. This paper provides a technical overview of the architecture behind LogMeIn. 1 Introduction 2 Data Confidentiality 3 Authentication 4 Key Agreement 5 Message Exchange
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
BOLDCHAT ARCHITECTURE & APPLICATION CONTROL
ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
Welcome to Sookasa. Getting Started Guide for SafeMonk users
Welcome to Sookasa Getting Started Guide for SafeMonk users Welcome to Sookasa! About Us Like Safemonk, Sookasa provides Dropbox encryption to protect your information at the file level, so it s safe both
ProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
Blue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Dropbox for Business security A Dropbox whitepaper
A Dropbox whitepaper Contents Introduction 3 Under the hood 3 Architecture Dropbox user interfaces Reliability Encryption Product features 6 Admin management features User management features Apps for
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Our Key Security Features Are:
September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
LogMeIn Rescue Architecture
LogMeIn Rescue Architecture A technical overview of Rescue s architecture. Introduction...1 Data Confidentiality...2 Key Agreement...3 Message Exchange...3 Authentication and Authorization...4 Auditing
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
SharePlus Enterprise: Security White Paper
INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
Oracle WebCenter Content
Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: [email protected] Introduction In May 2011, US Data Management (USDM) was
ITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Crypho Security Whitepaper
Crypho Security Whitepaper Crypho AS Crypho is an end-to-end encrypted enterprise messenger and file-sharing application. It achieves strong privacy and security using well-known, battle-tested encryption
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard August 2014 Table of Contents Introduction... 1 PCI Data Security Standard...
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration
White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Secure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
How To Get A Certificate From Digicert On A Pc Or Mac Or Mac (For Pc Or Ipa) On A Mac Or Ipad (For Mac) On Pc Or Pc Or Pb (For Ipa Or Mac) For Free
DigiCert User Guide Version 3.7 Contents 1 User Management... 7 1.1 Roles and Account Access... 7 1.1.1 Administrator Role... 7 1.1.2 User Role... 7 1.1.3 CS Verified User... 7 1.1.4 EV Verified User...
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012
Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
!!!! Memeo C1 Security !!!!!!!!!!! Bret Savage, CTO. October 2013. 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved.
Memeo C1 Security Bret Savage, CTO October 2013 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved. Guiding Principles Memeo C1 was scratch-built from the ground up to be the ultimate
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
