The Respect Network Technical and Operational Specifications Version 1.0

Size: px
Start display at page:

Download "The Respect Network Technical and Operational Specifications Version 1.0"

Transcription

1 The Respect Network Technical and Operational Specifications Version 1.0 V Abstract This subdocument of the Respect Trust Framework defines the technical and operational rules of the Respect Trust Framework. Note: this version defines the rules that apply to Cloud Service Providers (CSPs). Future versions will define the rules that apply to application developers. Table of Contents ABSTRACT TABLE OF CONTENTS PURPOSE SCOPE IMPLEMENTATION SCENARIOS CONFIGURATIONS CONFIGURATION 1: FULLY OUTSOURCED CONFIGURATION 2: CSP- HOSTED FRONT END CONFIGURATION 3: CSP- HOSTED STOCK BACK END SERVER CONFIGURATION 4: CSP- HOSTED CUSTOM BACK END CONFIGURATION SECURITY & PRIVACY REQUIREMENTS ADMINISTRATIVE ACCESS TO PERSONAL DATA LEGAL JURISDICTION AND NOTIFICATION MEET GENERAL SECURITY AND OPERATIONAL REQUIREMENTS 7 CONFIGURATION SECURITY & PRIVACY REQUIREMENTS AUTHENTICATE PERSONS TO THEIR PERSONAL OR BUSINESS CLOUDS ROBUST ACCOUNT RECOVERY

2 SUPPORT COORDINATED SECURITY AND OPERATIONS APPLICATION LAYER SECURITY ADMINISTRATIVE IDENTITY AND ACCESS MANAGEMENT ENDPOINT SECURITY NETWORK LAYER SECURITY LOGICAL AND PHYSICAL DATA CENTER SECURITY SECURITY MONITORING FRONT END SOFTWARE REQUIREMENTS BASIC FUNCTIONAL REQUIREMENTS POLICY & OPERATIONS BUSINESS CONTINUITY SERVICE LEVEL AGREEMENTS 13 CONFIGURATION SECURITY & PRIVACY REQUIREMENTS SUPPORT PERSONAL CLOUD CREDENTIAL MANAGEMENT AND PORTABILITY LOGICAL AND PHYSICAL DATA CENTER SECURITY BACK END SOFTWARE REQUIREMENTS 15 CONFIGURATION BACK END SOFTWARE REQUIREMENTS GENERATE XDI MESSAGES BETWEEN CSP, PEER CLOUDS AND RN SERVICES APPLICATION PROGRAM INTERFACES (APIS) FOR XDI MESSAGING MAINTAIN USER GRAPH XDI REPRESENTATION OF PERSONAL CLOUDS MAINTAIN CSP GRAPH XDI REPRESENTATION REQUIRE ONLY INDIRECT ACCESS TO THE RESPECT NETWORK MEMBER GRAPH CONTROL AND AUDIT ACCESS TO PERSONAL CLOUDS USING LINK CONTRACTS MEET DATA PROTECTION AND CRYPTOGRAPHIC REQUIREMENTS 16 FUTURE LOOKING STATEMENTS 5.1. PRIVACY AND SECURITY REQUIREMENTS ROBUST ACCOUNT RECOVERY CERTIFICATION AND ASSESSMENT SUPPORT COORDINATED SECURITY & OPERATIONS FRONT END AND BACK END SOFTWARE REQUIREMENTS MAINTAIN BUSINESS GRAPH XDI REPRESENTATION OF BUSINESS CLOUDS CSP TO PERSONAL CLOUD SESSION MANAGEMENT REQUIREMENTS AUTHORIZATION MANAGER AND CONNECTION MANAGER UI SERVICE ADVANCED AUTHENTICATION PLANS SECURE FILE STORAGE AND DATA EXCHANGE SIGNED XDI MESSAGE SPECIFICATION SUPPORT GLOSSARY 18 Page 2 of 19

3 Purpose The Respect Network is a global private network for individual members and business members. Respect Network Corporation has developed the legal, business and technical infrastructure (software) and maintains specifications required to operate the network. Cloud Service Providers (CSPs) provide the member interface to the network. The network is premised on business, legal and technical interoperability required to provide secure communications channels, personal data management and application functionality between members in a context of respect for individual privacy and control over personal data. For a more detailed introduction, see the main Respect Trust Framework. For a definition of frequently used terms and acronyms, see the Glossary below. Scope This specification is a subdocument of the Respect Trust Framework Version 2. It contains normative specifications for Respect Network members using MUST, SHOULD and SHOULD NOT keywords, which should be interpreted as described in [RFC 2119]. CSPs MUST self- assess against these specifications initially; processes for community review, third party assessment or certification may be established in the future. For more information on future plans see Section 5 Future Looking Statements. CSPs MUST comply with all MUST requirements within 60 days of the date on this specification unless otherwise stated herein. CSPs MUST comply with the majority of the SHOULD requirements within 90 days, except in cases where there is strong technical or security justification to not comply with a SHOULD requirement. Implementation Scenarios Figure 1 below describes the basic building blocks of a CSP: Page 3 of 19

4 Figure 1: Respect Network Software Modules and Services for CSPs Note: Based on Configurations The Respect Network Corporation will provide CSPs with software implementations of all the front end and back end service modules shown in Figure 1. A CSP may choose one of four configurations based on this software or customer software the CSP develops, to provide services as described below. The configuration selected has a material impact on how elements of this Technical and Operations Specification apply to the CSP. Each CSP is responsible for ensuring proper compliance as described in their Configuration level as well as all lower- numbered Configuration levels. So, for example, a CSP in running in Configuration 2 must implement Configuration 2 and Configuration 1 but is not required to implement Configuration 3 or Configuration 4. However, the CSP retains legal ownership of the service and responsibility to Respect Network members. The CSP MUST ensure that their outsourced providers ( contractors ) comply with all requirements delegated to those providers such that - between the CSP and the providers they comply with the complete Technical and Page 4 of 19

5 Operation Specifications specified in Configurations 1 through 3 (and Configuration 4 if applicable). Also, to the extent the CSP maintains personal data and services for Respect Network members outside of the personal cloud (e.g billing systems, mailing lists and others) the CSP MUST maintain equivalent protections for them (per Section 1.1.3) to fulfill their obligations under the Respect Trust Framework. Configuration 1: Fully Outsourced In the fully outsourced configuration, a CSPs has outsourced the entirety of personal cloud hosting and all personal- cloud related administrative functions (including all manually- implemented processes for portability, key management, support and other functions) to another provider. Configuration 2: CSP- Hosted Front End In the CSP- Hosted front end configuration, the Back End hosting is outsourced to a provider. Configuration 3: CSP- Hosted Stock Back End Server In the CSP- Hosted Stock Back End, the CSP is hosting and managing the entire Front End and Back End technical infrastructure using the then current release of the Project Danube XDI2 server software. Configuration 4: CSP- Hosted Custom Back End In the CSP- Hosted Custom Back End configuration, the CSP is hosting and managing the entire technical infrastructure and has modified the Project Danube XDI2 server software. Configuration 1 Configuration 1 CSPs are responsible for implementing the requirements in Section 1, and for ensuring their outsource suppliers comply with Sections 2, 3 and Security & Privacy Requirements This section provides requirements for CSPs and outsourced contractors running in this configuration regarding general security robustness Administrative Access to Personal Data Starting immediately: CSPs MUST implement documented administrator- level access control, separation of duty and audit/accountability policies, procedures and technologies. Page 5 of 19

6 CSPs MUST log all administrator access to personal data and MUST provide mechanisms or procedures to protect the integrity of the audit logs. CSPs MUST disclose o Any administrative access made to personal clouds outside of policy (unless legally prohibited from doing so according to the laws of their jurisdiction). o Any administrative access to their personal clouds made according to policy. CSPs MUST require two- factor authentication for administrators. CSPs MUST disclose to members: The levels and means of access CSP administrators have to the personal cloud and the policies governing such access. Note that as of the June release (before the deployment of Respect Network secure file storage technology) the persistent storage layer (currently using Mongo DB) is accessible to CSP administrators running the Graph Service. Their general legal interpretation of obligations to the jurisdictional authority o Policy on responding to governmental requests within jurisdictional due process (e.g. court order) for information targeted at an individual user, or small number of users o Policy on responding to governmental requests outside of due process for information targeted at an individual user, or small number of users o Policy on responding to governmental requests for bulk information about many users Legal Jurisdiction and Notification The CSP MUST disclose to members the national jurisdiction(s) where their data will be stored. CSPs MUST implement regulatory compliance and breach disclosure according to the legal requirements of their jurisdiction.. CSPs SHOULD resist through the legal processes available in their jurisdiction any governmental requests for bulk information targeted at many users. CSPs SHOULD set aside funds for their legal defense against bulk information requests. Page 6 of 19

7 CSPs SHOULD perform transparency reporting (aka warrant canaries ) wherein regular reports on the absence of governmental bulk data and/or targeted data requests are routinely issued unless and until such requests are received. Such reporting may be a way to partially circumvent gag orders that accompany some governmental data requests. When adopting transparency reporting, CSPs MUST consult legal counsel qualified in the applicable operating jurisdictions Meet General Security and Operational Requirements CSPs MUST develop security governance processes, including a Security Plan and Security Policy covering people, process and technology for both their internal operations and any outsource partner supply chain partners. CSPs SHOULD use ISO series, or a similar standards framework as their basis for security governance. CSPs MUST assess their operations against their stated security policies, track exceptions and incidents, and remediate exceptions and incidents. CSPs SHOULD engage third party auditors or other objective experts to assist their assessment. If the CSP maintains personal data and services for Respect Network members outside of the personal cloud (e.g billing systems, mailing lists) it and/or other outsourcers employed for those functions MUST also support the protections specified in this Section 1.1 and in Sections 2.1.4, 2.1.5, 2.1.6, and 2.1.8; however, if an outsourcer is industry- certified (e.g. through Payment Card Industry Data Security Standards certification in good standing) to provide personal data protection through alternate methods, some of those requirements may be waived. If the CSP and/or other outsourcers maintain accounts for members to access any personal information outside the personal cloud, they must support authentication mechanisms at least as robust as specified in Section and CSPs and contractors MUST NOT store databases, spreadsheet files or other lists containing members personal information on endpoint (client) devices used by their employees or contractors unless strong compensating controls are applied. Examples of compensating controls may include filtering the data, masking the data, encrypting the data and/or purging it shortly after use. In the event of a breach, any such compensating controls shall be deemed to have been inadequate. Personal information is defined to include any data that could be used to distinguish or trace a person s identity that comes into the CSP s possession Page 7 of 19

8 (e.g. but not limited to cloud names, cloud numbers, addresses, phone numbers, credit card numbers, IP addresses); other data that is legally protected in the CSP or the members jurisdiction as such; and any information that the member stores in the personal cloud, might reasonably consider private and has not released from privacy obligations under the service's terms and conditions or other valid opt- in process. CSPs and contractors MUST provide employees and contractors with clear policies and training on the protection of member data from social engineering attacks, on the protection of the endpoint (client) devices they use and in the fulfillment of other security- related roles and responsibilities. Configuration 2 Configuration 2 CSPs are required to implement the requirements in Sections 1 and 2. They are also responsible for ensuring their outsource suppliers comply with sections 3 and Security & Privacy Requirements This section provides requirements for CSPs running in this configuration regarding general security robustness Authenticate Persons to their Personal or Business Clouds Respect Network partners include companies providing advanced authentication solutions. CSPs may implement solutions that are stronger than password- based login, and Respect Network intends to extend more authentication options in the future. See the Section 5 for more information. Using the Authorization Manager Service, CSPs MUST meet the following minimum requirements for password login. Online login for the user must meet the following requirements o Any traffic communicated in the context of an authenticated session MUST be protected by HTTPS. SSL 3 and TLS 1.0 SHOULD NOT be used. o Inactive local user authenticated sessions MUST be re- authenticated after a configurable or defined interval. o Sensitive user profile management actions such as password changes SHOULD NOT be available based on single sign on (SSO) sessions and MUST require explicit re- authentication. o Stored user passwords MUST be stored salted and hashed by a one way hash algorithm, or protected through stronger Page 8 of 19

9 cryptographic mechanisms. MD5 and SHA- 1 SHOULD NOT be used. All passwords MUST adhere at least to the basic password specification. CSPs may furnish password strength and other authentication metadata in authentication flows to enable higher levels of assurance (LOAs) for relying parties. o Basic password: Must be at least 6 characters and contain at least one letter and one number. They should only be implemented in tandem with account lockout procedures (see below). o Medium Password: Must be at least 8 characters, have at least 1 letter, 1 number and at least one special character, #, $ etc. o Strong Password: Must be at least 10 characters and have at least 1 upper case letter, 1 lower case letter, at least one number and at least one special character, #, $ etc. New password cannot be the same as the previous three. CSPs must recommend password change every 180 days." CSPs MUST mitigate against "brute force" attacks on the login process, such as password and/or username guessing. Acceptable methods include either: o Use MEDIUM or STRONG password policies. o Or, support account lockout for a period of minutes after 3-5 failed login attempts and initiate robust account recovery after 5-10 attempts. Alternatively, support account lockout based on varying parameters using a security analytics system (sometimes termed passive authentication, or risk- based authentication). CSPs performing account lockout SHOULD mitigate the risk of it being used against them in denial of service attacks on a single user or their entire service. CSPs SHOULD mitigate against the risk of malware obtaining user passwords and logging in from a remote device. Acceptable methods include: o Use a two factor authentication code with a factor that is unlikely to be obtained through automated cyberattacks (e.g. SMS message to a secondary user device). o Support account lockout based on a security analytics system or a threat intelligence system. Page 9 of 19

10 Robust Account Recovery For password recovery after a lost password, or account lockout, CSPs MUST perform identity verification. One acceptable identify verification method is dual and SMS code verification Support Coordinated Security and Operations The following functions are required for CSPs in this configuration to enable data portability and to coordinate security and operations with other services on the Respect Network. Immediately following the June launch many of these functions may be provided manually with automation to be added at the earliest opportunity. Security Data Sharing: CSPs MUST implement regulatory compliance and breach disclosure according to the legal requirements of their jurisdiction and their customers jurisdictions. CSPs SHOULD also share threat indicators and other data from cyber- attacks they experience that could reasonably be expected to affect other Respect Network CSPs and members. Vulnerability reporting: CSPs utilizing the Personal Cloud Stack MUST notify the community of any vulnerabilities or bugs they locate Application layer security CSPs SHOULD document self- developed code and system architecture. CSPs SHOULD implement versioning, change and configuration control, change monitoring, rollback and staging of releases across development, testing and production areas. CSPs MUST utilize a methodology incorporating security into their software development life cycle (SDLC), including risk assessment, threat modeling and static code analysis against any self- developed code and the overall system. CSPs MUST require contractors or suppliers of code to also incorporate security into their SDLC. CSPs SHOULD conduct security reviews of and security testing against their APIs. CSPs SHOULD provide dynamic security testing, web application firewall (WAF) protection, application monitoring, and API security and monitoring. CSPs SHOULD assess and/or test Javascript (and other browser- based code that crosses the trust boundary between network services and client- side Page 10 of 19

11 devices) for cross site scripting, code injection and other applicable OWASP vulnerabilities Administrative Identity and Access Management CSPs MUST implement two factor authentication for their developer and administrator accounts. CSPs SHOULD implement role management, automated account de- provisioning, separation of duty and audit for administrative functions over internal development and operations. CSPs SHOULD implement robust internal processes for managing all system and service accounts and credentials (e.g. account naming standards, regular credential changes, token database encryption / protection) Endpoint security CSPs MUST implement password protection and software security updates for all physical or virtual servers, and all client devices used by development and operations staff to host or access members personal information. CSPs MUST also implement anti- malware scanning and system firewalls for all Windows- based servers and client devices and SHOULD implement same for most other OSes (e.g. Linux, Android, Apple OSX). CSPs SHOULD impart personal cloud users with knowledge of the above guidance and other security awareness through optional documentation or coaching Network layer security CSPs MUST deploy, use or contract for network and/or host server- based firewalls to protect physical or virtual servers. All firewalls SHOULD be centrally managed to receive regular threat feeds and configuration updates. CSPs MUST implement or use secure communication channels (e.g. SSH, IPSEC or SSL VPN) for administration of physical or virtual servers. Two factor authentication MUST be provided for all such remote access. CSPs SHOULD deploy, use or contract for network intrusion detection (IDS), DDOS protection, load balancers, CDNs, etc. to protect the confidentiality, integrity and availability of the services Logical and Physical Data Center Security Compute and storage resources used to host the running instances of Front End Software MUST be protected with physical data center and server Page 11 of 19

12 security, virtual server security and access controls, vulnerability and patch management, change monitoring, backups etc. at all logical and physical layers Security monitoring Security logs and events MUST be collected and regularly reviewed on administrative actions, security- related events and the operation and activity of security tools and infrastructure components. Security analytics SHOULD be used to monitor multiple logs and other security- related data or event sources. Where used, security and other analytics MUST NOT create persistent stores or tracking of non- anonymized personal data except as stated in the CSP's terms of service or privacy policies Front End Software Requirements Basic Functional Requirements The following functional flows MUST be supported within 90 days of release to staging: A Member may obtain additional Cloud Names A person signing up may select more than one Cloud Name A Member may transfer their Cloud Name from one CSP to another A Member may register Discovery Keys A Member may change their Cloud Name A Member may choose to leave the Respect Network Registration will be enhanced to include short holds on Cloud Names to prevent someone else from obtaining it during payment process. A Member may Register a Personal Cloud A Member may Register a Business Cloud Service and Key Discovery Member sets up XDI Link Contracts for Access Control Member reviews permissions granted to connections Member reviews connections to their Personal Cloud Key Management in Primary Cloud Interact with another Peer Cloud Interact with an external Service from a Personal Cloud Interact with a Personal Cloud from an external Service Move Primary Personal Cloud from one CSP to another Unregister Primary Personal Cloud Peer Cloud revocation Page 12 of 19

13 4.2. Policy & Operations Business Continuity CSPs MUST perform regular backups of the system components required to maintain service availability and security. CSPs SHOULD provide failover facilities as well as operational procedures and plans to recover from foreseeable power, network, system, storage and other component outages Service Level Agreements CSP hereby guarantees that its critical server and network infrastructure, their availability, and any other CSP Services, whether provided to RNC or to other Members, will meet or exceed all industry standards for cloud service providers operating within the local area in which the CSP operates. CSPs SHOULD publish an SLA for customers documenting Basic levels of availability (e.g %) Business continuity provisions (e.g. cold stand by, lazy replication) Support process (e.g. help desk hours and expected wait times) Configuration 3 Configuration 3 CSPs are responsible for implementing the requirements in Sections 1, 2, and 3. They are also responsible for ensuring their outsource suppliers comply with Section Security & Privacy Requirements Support Personal Cloud Credential Management and Portability The following functions are required for CSPs in this configuration to enable data portability and to coordinate security and operations with other services on the Respect Network. Immediately following the June launch many of these functions may be provided manually with automation to be added at the earliest opportunity. Peer cloud key management: CSPs MUST support mechanisms for key creation, replacement, removal and archival. Peer cloud lockout: CSPs MUST support both temporary peer cloud "account lockout" and disabling of its keys in the event of a security or privacy- related incident, such as a reported or detected compromise of Page 13 of 19

14 the credentials or suspension/revocation of the member's right to operate on Respect Network. Peer cloud backup and export: o CSPs MUST provide regular backup of personal cloud data for business continuity. o Upon the owner's request, CSPs MUST provide the ability to export a peer cloud's XDI graph in XDI Javascript Object Notation (JSON) serialization format and all files of personal or business data in their native format for download Peer cloud restore and import: CSPs MUST provide the inverse of "peer cloud offline backup and data export" so as to be able to accept existing peer cloud data moving to their service from another Respect Network CSP. CSPs MUST also provide this function to enable full or partial restore of the XDI graph or other personal data upon the owner's request. Cancellation of Service: CSPs MUST enable a peer cloud owner to cancel membership, export and then permanently delete the data. CSPs MUST offer unsubscribing persons or businesses the choice of moving to another CSP or permanently leaving the Respect Network. For users permanently leaving the Respect Network, CSPs MUST remove their cloud names, numbers and discovery keys from the Registry and SHOULD remove other data from the personal cloud upon the member s request. Cancellation of connections or permissions: The CSP Connection Manager MUST enable peer cloud owners to cancel one or more of their connections. CSPs SHOULD enable peer cloud owners to cancel any optional permissions associated with a connection without cancelling the entire connection. CSPs receiving requests to cancel connections or permissions MUST delete local copies or caches of the data. For connections or permissions whose ongoing maintenance are necessary to the maintenance of a contracted service CSPs MAY take other actions as specified in their Terms of Service or Privacy Policy Logical and physical data center security Compute and storage resources used to host the running instances of Back End Software and personal clouds MUST be protected with physical data center and server security, virtual server security and access controls, vulnerability and patch management, change monitoring, backups etc. at all logical and physical layers. Page 14 of 19

15 4.2. Back End Software Requirements CSP key management: CSPs MUST provide key management and protection over the keys to their own peer cloud at least as strong as those provided to protect their customers. As with peer cloud public key material, CSPs public keys will be stored in their CSP XDI graph and the corresponding private keys used to sign XDI messages. Configuration 4 Configuration 4 CSPs are responsible for implementing the requirements in Section 1, 2, 3 and Back End Software Requirements Generate XDI Messages Between CSP, Peer Clouds and RN Services All Respect Network flows between peer clouds in the network MUST be conducted via XDI Messages as specified by the OASIS XDI Technical Committee (XDI TC). CSPs MAY use arbitrary protocols for flows between their front end services and their individual or business customers and for services not related to Respect Network (such as internal flows or flows between the CSP s service and external sites, such as Flickr.) Application Program Interfaces (APIs) for XDI Messaging The Respect Network and Project Danube- provided software modules include application program interfaces (APIs) for CSPs to construct common flows using XDI messages. XDI message contents MUST be delivered via HTTPS Post operations to XDI endpoints denoted by cloud addresses, or URIs, of the peer clouds. For example, the request to register a new member has a message with an envelope containing mandatory and optional statements (i.e. lines in a message). All XDI messages between peer cloud XDI servers MUST be posted using HTTPS (for transport confidentiality and integrity) and signed with XDI signatures (for message integrity and origin authentication). Maintain Open and Interoperable Semantic Data Representations for Personal Clouds In order to assure portability and interoperability in the Respect Network, CSPs MUST be able to represent the peer clouds they host as XDI graphs and conduct XDI GET, SET, and other operations against the graphs as required to accomplish the flows using XDI messages. Page 15 of 19

16 Maintain User Graph XDI Representation of Personal Clouds CSPs MUST support representation of the user s personal cloud as an XDI graph called the User Graph, which is specified in the Member Graph Working Doc Maintain CSP Graph XDI Representation A form of a business graph that represents the CSP, itself a business on the Respect Network. contains the CSP's 'customer records'. Is also specified in the Member Graph Working Doc Require Only Indirect Access to the Respect Network Member Graph CSPs indirectly read and write the Respect Network Member graph (which contains the minimal required naming, addressing and other information necessary to maintain the network.) All such access is through the service APIs for the Registration Service, Discovery Service and Reputation Service Control and Audit Access to Personal Clouds Using Link Contracts CSPs MUST provide an Authorization Manager Service to evaluate and/or decline requests for access from peer clouds using XDI Link Contracts and XDI Policy Expressions as specified by the OASIS TC Meet Data Protection and Cryptographic requirements CSPs SHOULD provide disk or file level encryption for the XDI graph and all other personal cloud data. CSPs MUST provide the following key management functions: Generate public/private key pairs for signing and encrypting XDI message. CSPs MUST store the public keys in the user s graph and SHOULD support HSM storage of the private key(s). Support key change through their front- end interfaces and through administrative interfaces if either the member or the CSP believes a key has been compromised. Future Work This section identifies known areas to expect new requirements in the future. Additional future plans will be published as they develop. Page 16 of 19

17 4.1. Privacy and Security Requirements Robust Account Recovery Other acceptable identity verification methods (in addition to those described in Section and 2.1.2) may be provided by Identity Verification Partners in the future Certification and Assessment Requirements for reporting on the self- assessment, or for third party assessments or certifications may be determined by the partners in the future Support Coordinated Security & Operations Manage multiple peer clouds for a single owner: CSPs SHOULD enable a member to register or unregister/unsubscribe multiple peer cloud instances under its singular identity, or reputation, within a single or multiple CSPs Front End and Back End Software Requirements Maintain Business Graph XDI Representation of Business Clouds CSPs MUST support the ability for business members to be represented using an XDI organization graph which contains the business name and any other information particular to that business and that identifies the user graphs of the persons representing that business CSP to Personal Cloud Session Management Requirements CSP- provided applications and services MUST support Respect Network s Single Logout Profile (TBD). Through this specification, when a user logs out of the personal cloud (or times out through inactivity), the CSP MUST notify any Respect Network applications to which the user has authenticated (using the Connect Service) to log out any local sessions (e.g. HTTP) they maintain for the user Authorization Manager and Connection Manager UI Service The Authorization Manager Service and the Connection Manager UI Service MUST support the following additional requirements: Maintain base cloud portability for connections, relationships and permissions specified in link contracts. Display clear UI messages for the user as to the nature of the permissions granted to the opposite party (e.g. use but don t save my credit card number or mobile phone number ). Page 17 of 19

18 Maintain an audit trail of link contract creation, deletion or changes as well as of access to personal data controlled by link contracts Advanced Authentication Plans CSPs SHOULD (or MUST) offer members two factor authentication options and SHOULD offer extensible or federated identity authentication and levels of assurance support. For more information, see the Respect Network T&O Specifications: Informational Notes working document Secure File Storage and Data Exchange Respect Network plans to provide for secure file storage and secure data exchange in 2014 timeframe for all members. These requirements will be released in an upcoming version of this specification and will enable encryption of files, folders and data on the wire using encryption keys controlled by the member and not accessible even to the CSP s administrators Signed XDI Message Specification Support Configuration 4 requirements for signed XDI message formats will be specified in the Respect Network profiles of the corresponding XDI Signatures, XDI Cryptographic Syntaxes and/or XDI Security Mechanisms specifications. These specifications will cover not only the message signing formats, but also the requirement to limit caching of public keys used to verify signatures to less than 15 minutes, or some other short period to be specified. An update to this specification will incorporate these requirements once they can be presented in detail. Glossary Business Graph: The XDI Graph that may contain identity, security, Discovery, Identification, Link Contracts, user data, discovery and encryption keys, member profile and services for a Business Member. The Business Graph is typically stored by the CSP but may be hosted elsewhere. Discovery: The process of locating a Cloud Name and associated Cloud Number on the Respect Network. Link Contract: A mix of human and machine- readable policy that governs the access and distribution of data. A link contract is a binding agreement between parties in the Respect Network systems of accountability. Member Graph: The Member Graph is an XDI Graph that may contain identity, security, Discovery, Identification, Link Contracts, user data, discovery and Page 18 of 19

19 encryption keys, member profile and services for an Member who is not a business. The Member Graph is typically stored by the CSP but may be hosted elsewhere. Personal Cloud: The equivalent of personal computer except operating in the cloud, i.e., not on a physical device you carry. A Personal Cloud stores information that can be accessed by the Member who owns the Personal Cloud. Specific sections of a Personal Cloud can be shared with other Members. By default, the Personal Cloud is hosted at the Member s CSP but a Personal Cloud can be hosted anywhere. Respect Network Application: A program written by a developer working for a company that has agreed to the Respect Trust Framework. This application takes on the identity and reputation of that company and its administrator accounts. Respect Network Infrastructure Services: Currently comprise the registration, discovery, connect and reputation service. Dictionary, signaling and billing services planned. XDI Graph: All XDI data conceptually belongs to a global graph in which it can be addressed through uniform resource identifiers (URIs) and to a local graph controlled by an administrative authority. A personal cloud is an example of an XDI graph. XDI Message: An XDI graph sent between two or more XDI endpoints to perform semantic data interchange. Copyrights and Trademarks Copyright 2014 Respect Network Corporation. Respect Network, Respect Trust Framework, Respect Reputation System, Respect Credits, and The Respect Promise are trademarks of Respect Network Corporation. Respect Network Corporation 3145 Geary Blvd #419, San Francisco, CA, Page 19 of 19

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud) SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

MIGRATIONWIZ SECURITY OVERVIEW

MIGRATIONWIZ SECURITY OVERVIEW MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...

More information

Salesforce1 Mobile Security Guide

Salesforce1 Mobile Security Guide Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application FileRunner Security Overview An overview of the security protocols associated with the FileRunner file delivery application Overview Sohonet FileRunner is a secure high-speed transfer application that

More information

How to complete the Secure Internet Site Declaration (SISD) form

How to complete the Secure Internet Site Declaration (SISD) form 1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Von Welch February 3, 2012

Von Welch February 3, 2012 Globus Online Security Review Von Welch February 3, 2012 1 Introduction This document represents a cybersecurity risk assessment of the Globus Online File Transfer service and associated Website service.

More information

Paxata Security Overview

Paxata Security Overview Paxata Security Overview Ensuring your most trusted data remains secure Nenshad Bardoliwalla Co-Founder and Vice President of Products nenshad@paxata.com Table of Contents: Introduction...3 Secure Data

More information

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility. FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer

More information

PRIVACY, SECURITY AND THE VOLLY SERVICE

PRIVACY, SECURITY AND THE VOLLY SERVICE PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

Adobe Digital Publishing Security FAQ

Adobe Digital Publishing Security FAQ Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

DATA SECURITY AGREEMENT. Addendum # to Contract #

DATA SECURITY AGREEMENT. Addendum # to Contract # DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS

More information

VMware vcloud Air Security TECHNICAL WHITE PAPER

VMware vcloud Air Security TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

Addressing Cloud Computing Security Considerations

Addressing Cloud Computing Security Considerations Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account

More information

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

End User Devices Security Guidance: Apple OS X 10.10

End User Devices Security Guidance: Apple OS X 10.10 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Acano solution. Security Considerations. August 2015 76-1026-01-E

Acano solution. Security Considerations. August 2015 76-1026-01-E Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration

More information

Advanced Service Desk Security

Advanced Service Desk Security Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service

More information

Birst Security and Reliability

Birst Security and Reliability Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their

More information

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING 6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information

More information

Adobe Systems Software Ireland Ltd

Adobe Systems Software Ireland Ltd Adobe Systems Software Ireland Ltd Own motion investigation report 13/00007 Timothy Pilgrim, Australian Privacy Commissioner Contents Overview... 2 Background... 3 Relevant provisions of the Privacy Act...

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Fortinet Solutions for Compliance Requirements

Fortinet Solutions for Compliance Requirements s for Compliance Requirements Sarbanes Oxley (SOX / SARBOX) Section / Reference Technical Control Requirement SOX references ISO 17799 for Firewall FortiGate implementation specifics IDS / IPS Centralized

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

Tableau Online Security in the Cloud

Tableau Online Security in the Cloud Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise

More information

WEBSITE PRIVACY POLICY. Last modified 10/20/11

WEBSITE PRIVACY POLICY. Last modified 10/20/11 WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

Reference Architecture: Enterprise Security For The Cloud

Reference Architecture: Enterprise Security For The Cloud Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application

More information

DISCLOSURE STATEMENT PREPARED BY

DISCLOSURE STATEMENT PREPARED BY DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State

More information

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation

More information