Clarizen Security White Paper
|
|
|
- Marcia Cannon
- 10 years ago
- Views:
Transcription
1 WHITE PAPER Clarizen Security White Paper Standards and Practices UNITED STATES UNITED KINGDOM ISRAEL FRANCE
2 Table of Contents Introduction Application Security Password Policy Logical Security Penetration Testing Application Content Filtering IP Restriction Encryption Cloud Authentication Infrastructure Security Network Architecture Vulnerability Management Data Centers Cloud Operation Security Data Privacy and Certifications Physical Security Environmental Security Organizational Security Contact Us Appendix
3 INTRODUCTION Introduction Enterprises increasingly rely upon third-party software and services to handle business-critical processes and operations. Whether on-premises or in the cloud, these solutions must provide a level of security that protects critical company data and minimizes risk. Clarizen s security standards and practices are backed by a multi-layered approach that incorporates best practices for preventing security breaches, as well as ensuring data integrity, availability and confidentiality. The Clarizen security model encompasses the following components: Application Security Network and Infrastructure Security Physical and Environmental Security Organizational Security Cloud Operational Security Service Compliance and Certification Application Security Password Policy STRONG PASSWORD POLICY Clarizen s strong password policy requirements govern the creation, protection and frequency of password changes. These requirements serve as a baseline or minimum recommended password requirement; more stringent password policies can be established as needed. Passwords are transferred via a hypertext transfer protocol secured (HTTPS) connection, a protocol that encrypts communication between the web server and browser and secures the identification of the web server. Every Clarizen user must have a unique account ID in order to access the platform. This account ID is used to track user activity, as well as assign and enforce the correct permissions level. ACCOUNT LOCKOUT POLICY To protect against dictionary-based, brute-force attacks, Clarizen uses an account lock-out policy, where user accounts are locked after three failed login attempts. See the Encryption section (page 5) for information on password encryption. Page 3
4 APPLICATION Logical Security MULTI-TENENCY ACCESS CONTROL Clarizen uses a proprietary data-access layer that requires a valid organization identifier in order to access the database. The identifier resides in a secured session variable and is passed between all layers to the data access layer, thereby restricting user access within each session. Given the importance of access control mechanisms, Clarizen continuously tests its security system and processes, and constantly monitors them to ensure they are functioning properly. Penetration Testing EXTERNAL AUDITS Clarizen regularly engages external security testers and professional application auditors as part of its software development lifecycle. These experts perform penetration tests using the open web application security project (OWASP) methodology for multiple attack scenarios, as well as several proprietary attack scenarios developed by Clarizen. PENETRATION TEST SUMMARY REPORT Clarizen shares penetration test report executive summaries with its customers. These summaries include test findings, along with all actions taken to re-mediate any issues that may have been found. AUTOMATED SCANS Clarizen s internal security team performs regular, automated security scans on the production network to validate that both the network and infrastructure are free of vulnerabilities. Application Content Filtering WEB TRAFFIC INSPECTION AND SANITATION Clarizen uses an integrated, proprietary application content filtering system that inspects, sanitizes and forwards traffic, as well as validates user input. The white-listing approach adopted by Clarizen ensures clean data input, as well as enhances the content filtering system s capabilities and accuracy. Inspect, Sanitize, Forward To prevent all forms of crosssite scripting (XSS), SQL injection and other such activities, Clarizen has fully integrated a proprietary sanitation engine into the platform, which inspects all traffic prior to forwarding and processing. Page 4
5 APPLICATION IP Restriction RESTRICTING LOGIN IP ADDRESS Clarizen users can restrict access to their projects and data by monitoring and filtering account access by IP address. Only the IP addresses on the customizable list will be granted account access all other IP addresses are automatically blocked. Encryption DATA AT REST ENCRYPTION Clarizen deploys industry-leading encryption algorithms to secure customer data, files and media that reside in Clarizen storage systems. All data is encrypted with advanced encryption standard (AES) with a 256-bits block size the same level of data security required by the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act (HIPAA). PASSWORDS: HASH, SALT AND STORE Clarizen takes a multi-level approach to storing all sign-in credentials. Protection begins with hashing passwords, a common approach for taking passwords of varied lengths and turning them into cryptic, fixed-length passwords for storage. Clarizen also salts customer passwords, or adds extra data that is unique to every user to employ an additional level of password protection. KEY MANAGEMENT POLICY Clarizen pays special attention to the key lifecycle, as well as the allocation of roles within the key management infrastructure. Clarizen s key management policy employs a set of rules designed to secure the key lifecycle, using a combination of security mechanisms that include strong password, routine revocation of keying, key backup and recovery. DATA IN TRANSIT ENCRYPTION Upon sending any data between the user browser and the Clarizen cloud, Clarizen establishes an HTTPS connection, which encrypts all communication between the web server and client browser. It also secures the identification of the web server via an industry-leading certificate authority. Page 5
6 APPLICATION Cloud Authentication FORM AUTHENTICATION Clarizen authenticates all users with a unique ID and password. Prior to submitting the authentication form, Clarizen creates a secured communication tunnel so that user credentials are submitted over encrypted sessions. The authentication process requires an HTTPS/443 port in order to communicate with the Clarizen cloud. Users do not need to download or install software to access their projects or data. SAML AUTHENTICATION As an additional security mechanism, Clarizen supports security assertion markup language (SAML) authentication, which is a protocol used to securely exchange authentication and authorization data between customer systems and Clarizen. SAML gives Clarizen customers the ability to control password policy, user management and authentication. During the login process, an SAML token is transmitted to the Clarizen platform over a secured tunnel and a session is created. To enhance security, the tokens do not contain user passwords. SINGLE SIGN-ON (SSO) AND TWO-FACTOR AUTHENTICATION The Clarizen platform integrates with OneLogin to provide users with a single sign-on (SSO) solution. When using the SSO integration, organizations can require their employees to use a strong authentication factor, in addition to their password, when they sign in. Two-factor authentication is a more secure method of verifying or validating identity. OneLogin offers a range of strong authentication options and supports pre-integrated solutions from Duo Security, RSA, Symantec, VASCO and Yubico. APPLICATION SESSION TIME-OUT Clarizen helps to secure user accounts with an application session time-out. Once an inactive or idle sessions session is timed out, users must re-authenticate to access their account. In the event of a session time-out, no data or work is lost since Clarizen automatically saves all data every few seconds. Page 6
7 Infrastructure Security Network Architecture For a complete view of Clarizen s network infrastructure, please see Figure 1 in the Appendix. INFRASTRUCTURE FIREWALLS Clarizen s ICSA Labs-certified firewall provides next-generation protection, including deep-packet inspections while maintaining high bandwidth and low latency. Clarizen application-layer firewalls protect against the OWASP topten attacks. The firewalls are fully integrated with Clarizen application scanners and can provide virtual patching capabilities. Assessment results are imported from the security scanner and custom policies can be created in real time to re-mediate any vulnerabilities. A reputation engine also detects and filters against known malicious IP addresses, anonymizing services, phishing URLs and IP geo-location data. This serves as an additional defense against automated attacks. ANTI-VIRUS PROTECTION Today s viruses and malware are persistent, difficult to detect and require a multi-layered approach to combat. The Clarizen network topology gives Clarizen security teams visibility into system health via multiple points across the network along with the ability to inspect suspicious behavior, botnet connections and viruses. MULTI ENGINE ARCHITECTURE Clarizen anti-virus engines protect against viruses, Trojans, malware and other malicious code. Additionally, all scan engines are connected to a management server, which receives daily updates and pushes them across the network as needed. The management server also validates that all updates are deployed and functioning properly, and looks for anomalies that may indicate an update has failed. If an update fails, the management server alerts the Clarizen security team in real time. ACCESS CONTROL A centralized group and role management system is used to define and control Clarizen engineers access to data centers. Clarizen engineers connect through a secured tunnel to production data centers using Active Directory for authentication along with personal certificates and an integrated firewall policy with group authorization. The following practices are followed to prevent unauthorized access to Clarizen data centers: Maintain strict access control approval process Block administrator (root user) logins Grant least privilege access (access given on an asneeded basis) Record successful and failed login audit logs Conduct content filtering, intrusion prevention and application validation Page 7
8 INFRASTRUCTURE Vulnerability Management All cloud assets are classified so that potential threats are prioritized and assigned an appropriate remediation process according to the type of issue and its severity and exposure. Clarizen uses a combination of automated and manual tools to continuously scan for security threats and prioritize, investigate and re-mediate any incidents or vulnerabilities. PATCH MANAGEMENT LIFECYCLE Remediation often results in a patch to some component of the Clarizen platform. Clarizen thoroughly checks and tests that any remediation is working properly throughout the platform. Moreover, Clarizen scans all network segments in real time to detect vulnerabilities or missing patches. The system agent reports any vulnerability to the management server so that remediation can begin. Remediation patches are deployed to the production network after passing a required quality assurance test and a strict policy approval. EMERGENCY PATCH INSTALLATION All emergency security patches that re-mediate vulnerabilities are installed immediately. System snapshots are also created to provide rollback capabilities, if required. VULNERABILITY WINDOWS To prevent and mitigate performance issues, Clarizen has developed a procedure to scale the network to meet capacity in near real time. Specifically, we maintain numerous servers on standby, meaning they are not connected to the production network. When additional scale is required, Clarizen s patch-engine agent updates the standby servers and connects them to the production network. Page 8
9 Data Centers INFRASTRUCTURE Clarizen cloud applications are hosted in highly available data centers with a global uptime average of >99.999%. Clarizen s primary colocation data center is located at Equinix, in Sunnyvale, California; the collocation disaster recovery site is located at Telx, New Jersey. DATA CENTER CERTIFICATES Clarizen data centers operate with the following data center certificates: SSAE16 COMPLIANCE The SSAE16 audit minimizes the need for multiple sets of auditors to separately examine the same set of controls that govern a third party s services. SAS statement on auditing standards, are a set of standards issued by the American Institute of Certified Public Accountants. ISO Certification This certification indicates the standard of protection supported at a data center related to the level of information security, physical security and business continuity maintained. It ensures that: Risks and threats to the business are assessed and managed Physical security processes such as restricted/named access are enforced consistently Audits are conducted regularly at each site that include tests of security and CCTV planning and monitoring LEED Certification LEED, or Leadership in Energy and Environmental Design, is an internationally recognized green building certification system. Developed by the U.S. Green Building Council (USGBC) in March 2000, LEED provides building owners and operators with a framework for identifying and implementing practical and measurable green building design, construction, operations and maintenance solutions. DISASTER RECOVERY AND CONTINUITY PLAN Clarizen maintains a robust disaster recovery program at all data centers, which are distributed across the United States. A high-speed encrypted VPN tunnel connects the data centers and supports traffic shifting or traffic failover. To prevent data loss, Clarizen performs ongoing data replication and backup within each data center to a local disaster recovery site, and to the hot standby data center. DISASTER RECOVERY AND BUSINESS CONTINUITY TESTING Clarizen has both a disaster recovery plan and a business continuity plan in place, and regularly tests them to ensure they are working properly. The disaster recovery plan includes a comprehensive and established series of actions to take before, during and after a disruptive event. It includes an alternative processing site and an approach to return to the primary processing site as quickly as possible. The business continuity plan includes a comprehensive approach to quickly restore computer systems upon the event of any service interruption. Page 9
10 INFRASTRUCTURE Cloud Operation Security PRODUCTION SITE CHANGE MANAGEMENT Changes to production networks are executed strictly within scheduled maintenance windows, which are communicated to customers via the Clarizen Trust Site and RSS feeds. Clarizen change management processes include separation of duties, authorization chain, change auditing and change summary management reporting. SERVICE MONITORING The Clarizen platform is monitored on a 24/7 basis, using external and internal probes to monitor service availability and security issues. These probes are configured to send alerts on a wide variety of criteria, including security, availability and performance degradation. LOG ANALYSIS Clarizen conducts log analysis to identify any events that are relevant to the security and availability of Clarizen systems. Servers and network equipment logs are delivered to the centralized log analysis server. This server is configured to send alerts any time a threshold has been passed or a correlation rule has been triggered. If the system discovers that thresholds have been reached across multiple infrastructure components the incidents are flagged as a network anomaly and are escalated and investigated. CLARIZEN TRUST SITE The Clarizen IS team communicates all service status to customers via the Clarizen Trust Site, trust.clarizen.com. If required, Clarizen customers will also receive an incident root cause analysis report within 14 business days discovering of any relevant incident or anomaly. Page 10
11 INFRASTRUCTURE Data Privacy and Certificates PRIVACY POLICY Clarizen s Privacy Policy fully discloses the type of information we may gather from Clarizen website visitors, as well as how we may use this information. We do not collect any personally identifiable information (PII), except when such information is voluntarily submitted by the visitor. PERSONAL INFORMATION OF CUSTOMERS AND PROSPECTS Contact information represents any PII data that can be used to uniquely identify a visitor. Contact information is required for visitors to access Clarizen services and software, as well as for receiving newsletters or any commercial offers. All contact information, including, but not limited to, name, address, telephone number and address, is held in strict confidence. This information is collected so that Clarizen can deliver the services customers and prospects request, and may also be used to deliver customer information and updates along with newsletters or commercial offers. Clarizen does not sell or share contact information with any third party. SAFE HARBOR Clarizen complies with the U.S.-E.U. Safe Harbor Framework and the U.S.- Swiss Safe Harbor Framework and has met all obligations under the E.U. Directive on Data Protection, the Swiss data protection law and the Personal Information Protection and Electronic Documents Act (PIPEDA). Clarizen has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access and enforcement. SOC 2 TYPE II Clarizen is in full compliance with service organization control (SOC) 2 Type II, an audit that ensures an effective control system is in place to mitigate operational and compliance risks, and can demonstrate Clarizen s commitment to security. Clarizen has completed the SOC 2 Type II audit of Clarizen hosted services and applications and is fully compliant with the SOC 2 trust service principles of security, availability, processing integrity, confidentiality and privacy of the system. Ernst & Young performed the audit. Page 11
12 PHYSICAL Physical Security Environmental Security Clarizen s data centers are geographically distributed, and employ a variety of strict physical security controls, which include: Closed-circuit TV cameras Security zone separation and authorization Security authentication and Access Logs HVAC - Heating, ventilation and air conditioning Fire prevention detection and suppression Organizational Security PERSONNEL Clarizen makes every effort to screen all employees and contractors. All candidates are prescreened, and when allowable by law, subject to background checks. In addition, all employees and contractors are bound by the Clarizen code of ethics, information security policy and application and security training. ACCEPTABLE USE POLICY Clarizen maintains a comprehensive and clear acceptable use policy (AUP), which is communicated to all Clarizen employees and contractors. The AUP outlines the acceptable use of all equipment, information, electronic mail, computing devices and network resources. Clarizen ensures that its employees understand and comply with information security policies to minimize the risk of virus attacks, legal issues and compromised systems or services. INFORMATION The Clarizen security team Is responsible for maintaining Clarizen s defense systems, developing security review processes, conducting security design and implementation reviews and building a customized security infrastructure. The team is also responsible for the development, documentation and implementation of security policies and standards. Page 12
13 CONTACT US Contact Us Our Offices UNITED STATES 2655 Campus Drive. Suite 150, Sam Mateo, CA T: 1 (866) F: 1 (650) FRANCE 6, Rue Rougemont Clarizen Authorized Training and Service Center (AJC Formation) Paris T: (0) UNITED KINGDOM T: AUSTRALIA T: 1 (800) ISRAEL 4 Hacharash St, 10TH Flr., Building C PO Box 7330 Hod Hasharon, T: 972 (9) TAIWAN No.413, Mingshui Rd., Zhongshan Dist., Taipei City 104, Taiwan (R.O.C.) T:+886 (2) SOUTH AFRICA T: +27-(0) RUSSIA T: CLARIZEN SALES If you d like to receive more information about purchasing Clarizen project management software subscription licenses, contact us at [email protected] BUSINESS DEVELOPMENT Companies seeking to forge mutually beneficial partnerships can send an to [email protected] GENERAL INFORMATION For general information and queries, please send an to [email protected]
14 APPENDIX Appendix Figure 1: Clarizen s network infrastructure DATABASE LOAD BALANCER APPLICATION NETWORK CONTENT INSPECTION APPLICATION FIREWALL NETWORK FIREWALLS ISP WEB NETWORK ANTIVIRUS SERVER BACKEND NETWORK BACKEND NETWORK SERVER WEB NETWORK ISP DATABASE LOAD BALANCER NETWORK FIREWALLS APPLICATION NETWORK BACKEND COMPONENT APPLICATION FIREWALL LEGEND INTRUSION PREVENTION ANTIVIRUS & MALWARE PROTECTION VIRTUAL LOCAL AREA NETWORK LINE 1 VIRTUAL LOCAL AREA NETWORK LINE 2 ZONE 1 SECURED TUNNEL VIRTUAL LOCAL AREA NETWORK LINE 3 ZONE 2 Appendix
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
ProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization
Delivering Peace of Mind in Digital Optimization TABLE OF CONTENTS INTRODUCTION 2 PRIVACY AND ANONYMITY 3 ISO 27001 COMPLIANCE 5 APPLICATION-LEVEL SECURITY 6 PENETRATION TESTING AND SECURITY AUDITS 7 GENERAL
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Delivering peace of mind in digital optimization: Clicktale's security standards and practices
THE CLICKTALE DIFFERENCE Delivering peace of mind in digital optimization: Clicktale's security standards and practices CONTENTS INTRODUCTION... 2 PRIVACY AND ANONYMITY...2 ISO 27001 COMPLIANCE...4 APPLICATION-LEVEL
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Birst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
Security & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Blue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT
A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT TECHNICAL DOCUMENT SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT 2 OVERVIEW When it comes to deploying Microsoft
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk
Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Cloud Contact Center. Security White Paper
Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may
Secure, private, and trustworthy: enterprise cloud computing with Force.com
Secure, private, and trustworthy: enterprise cloud computing with Force.com WHITE PAPER Contents Abstract... 1 Introduction to security, privacy, and trust... 1 Cloud computing and information security
Citrix GoToAssist Service Desk Security
Citrix GoToAssist Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. 2 Many service
Security and Data Protection for Online Document Management Software
Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer
Connectivity to Polycom RealPresence Platform Source Data
Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
Enterprise Architecture Review Checklist
Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
SNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
Building Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
