Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.



Similar documents
KeyLock Solutions Security and Privacy Protection Practices

Tableau Online Security in the Cloud

Live Guide System Architecture and Security TECHNICAL ARTICLE

Famly ApS: Overview of Security Processes

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Security Practices, Architecture and Technologies

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Security, Risk, and Compliance: Engine Yard

Building Energy Security Framework

Application Security Best Practices. Matt Tavis Principal Solutions Architect

White Paper How Noah Mobile uses Microsoft Azure Core Services

THE BLUENOSE SECURITY FRAMEWORK

Time to Value: Successful Cloud Software Implementation

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Anypoint Platform Cloud Security and Compliance. Whitepaper

Acano solution. Security Considerations. August E

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Security Information & Policies

Security Overview Enterprise-Class Secure Mobile File Sharing

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

A Rackspace White Paper Spring 2010

Security Whitepaper. NetTec NSI Philosophy. Best Practices

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

White Paper: Librestream Security Overview

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Security & Infra-Structure Overview

The Education Fellowship Finance Centralisation IT Security Strategy

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Cloud Security Who do you trust?

BMC s Security Strategy for ITSM in the SaaS Environment

319 MANAGED HOSTING TECHNICAL DETAILS

Projectplace: A Secure Project Collaboration Solution

PCI Requirements Coverage Summary Table

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

ShareFile Security Overview

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Clever Security Overview

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Cloud S ecurity Security Processes & Practices Jinesh Varia

PCI Compliance for Cloud Applications

WALKME WHITEPAPER. WalkMe Architecture

twilio cloud communications SECURITY ARCHITECTURE

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

CONTENTS. PCI DSS Compliance Guide

Helping people make better decisions DATA SECURITY POLICY. Kiilakiventie 1, Oulu, Finland tel:

Secure, Scalable and Reliable Cloud Analytics from FusionOps

FMCS SECURE HOSTING GUIDE

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Secure networks are crucial for IT systems and their

Platform as a Service and PCI

Amazon Web Services: Risk and Compliance January 2011

Apteligent White Paper. Security and Information Polices

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

March

Autodesk PLM 360 Security Whitepaper

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

A Decision Maker s Guide to Securing an IT Infrastructure

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

StratusLIVE for Fundraisers Cloud Operations

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

How To Achieve Pca Compliance With Redhat Enterprise Linux

DiamondStream Data Security Policy Summary

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Client Security Risk Assessment Questionnaire

Paxata Security Overview

QuickBooks Online: Security & Infrastructure

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Tenzing Security Services and Best Practices

FormFire Application and IT Security. White Paper

Amazon Web Services: Risk and Compliance July 2012

IBX Business Network Platform Information Security Controls Document Classification [Public]

PCI DSS Requirements - Security Controls and Processes

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

74% 96 Action Items. Compliance

Digi Device Cloud: Security You Can Trust

Security Threat Risk Assessment: the final key piece of the PIA puzzle

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

A Survey on Cloud Security Issues and Techniques

PCI DSS 3.0 Compliance

SysAid Cloud Architecture Including Security and Disaster Recovery Plan

Cloud Security and Managing Use Risks

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Security for Cloud- and On Premise Deployment. Mendix App Platform Technical Whitepaper

Security Controls for the Autodesk 360 Managed Services

Enforcing PCI Data Security Standard Compliance

Transcription:

FME Cloud Security

Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer Data Locations Application Security I. FME Cloud Application Security II. FME Server Application Security III. Risk Assessment Shared Responsibility Network Security On-Premise Deployment of FME Server

Safe Software s entire business is built on data, and we understand that it is among the most important assets of any organization. The security and privacy of your data is our highest priority. Safe Software s FME Cloud security features manage operational security, user security, data security, application security and transmission security. To keep you secure, we: Engage in secure design practices. Continuously identify and address security threats. Focus on operational processes. Employ third-party organizations to perform audits. FME Cloud Architecture Overview To understand FME Cloud security, a grasp on the architecture is crucial. Two components comprise FME Cloud. The first component is the dashboard/api, hereon referred to as the FME Cloud tier. This is a multitenant application where you sign up, launch/manage FME Server instances, and conduct billing and account management. The second component are the FME Server instances. These are where you publish your workspaces and associated data. Each FME Server instance is a self-contained environment, isolated from other instances, and includes compute, storage, and database services. Unlike some other cloud providers, no functionality is shared between virtualized instances. Under our single tenancy model, customers own and operate their own instances. Since all FME Server functionality can be accessed via the web interface or API, there is no direct access to the server. Dashboard/API FME Server Instances safe.com 1

Secure Operations Safe Software s internal policies control how we manage the infrastructure and developments of FME Cloud. These policies complement the controls that our IaaS provider, Amazon Web Services, provides. Backup FME Cloud Tier Database backups are taken every 12 hours, and we keep the last 20. We also take a snapshot of the entire stack, every 24 hours, and these persist for 90 days. FME Server Instances Backup created automatically every 24h while the instance is running. Backup created automatically after an instance is stopped. Backup created automatically before an instance configuration changes (such as a change in instance type). The last 15 automatic backups are kept. Backups can be triggered manually by the user. These are kept indefinitely until the instance is terminated or the user deletes them. If the need ever arises to rebuild an instance, the customer can restore an instance from previous backups. Once an instance is terminated, all data associated with the instance is immediately destroyed. Data Governance and Privacy FME Cloud Tier FME Cloud does not receive, process, or store customer credit card information in its infrastructure. Our billing page redirects to a third-party payment processing service, Braintree, that is fully PCI DSS compliant. FME Server Instances Your data is your own, even when stored on your FME Server instances. Only your authorized users have access to data or workspaces stored on an FME Server instance. Safe Software employees and other customers do not have access to your data. The only exception is a small and controlled number of Safe Software system administrators who have access to the entire system. These administrators can only access your data under very controlled circumstances. You will receive an automated e-mail whenever an administrator accesses your instance, and all operations are logged. Safe Software does access and monitor metrics on system utilization and performance, including disk usage, network throughput, server load, and application monitoring. By checking the performance and reliability of the server, we can alert you if there are any problems. Destruction of Data Upon termination of your FME Cloud account, assuming there is no outstanding balance, Safe Software destroys all data associated with your account, including any running instances and data associated with those instances. safe.com 2

Incident Reporting Safe Software is committed to reporting any incident that may impact the customer as soon as possible, especially when customer data could be involved. Of course, it is our hope that we never have to notify you of such a reason. If you believe you have discovered a bug in Safe s security, please get in touch at support@safe.com. We ask that you not publicly disclose the issue until it has been addressed. Development Safe Software engages in best practice techniques for software development, including code reviews, automated bug testing, and staging environments for manual testing. Continuous vulnerability testing is also in place to ensure any new threats are identified and addressed. Working with a CISSP-certified third party, we incorporate on-board feedback to ensure we are always developing with security on our minds. Customer Data Locations All our physical infrastructure is hosted and managed by Amazon Web Services (AWS) via their secure data centers. An industry leader in cloud computing, AWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. AWS s data center operations are accredited under: ISO 27001 SOC 1/SSAE 16/ISAE 3402 (Previously SAS 70 Type II) PCI Level 1 FISMA Moderate Sarbanes-Oxley (SOX) For more information about AWS compliance, see the AWS Risk and Compliance whitepaper. Application Security FME Cloud Application Security The FME Cloud tier is built and designed using industry-standard security practices. The web application is accessed via an SSL-encrypted user login. Password rules and a password strength meter are in place to encourage users to choose secure passwords. Two-step authentication can also be configured to add an extra layer of protection to the authentication process. The API that provides programmatic access to various components of the applications is implemented using the OAuth 2.0 bearer token standard. Upgrade and Maintenance Both the operating system and database are upgraded/patched as releases become available. Patches are applied to the staging environment first to ensure they do not cause issues. safe.com 3

FME Server Application Security Access to FME Server instances is limited to a web user interface and API (customers cannot use SSH). Like the rules for setting up an inbound network firewall, customers can control the protocols, ports, and source IP ranges that are allowed to reach your instance. FME Server Configuration FME Server has the flexibility to meet any organization s needs. FME Server ships with its own security module that gives an administrator full control over: Roles Which resources should provide unauthenticated access? Which resources should users have access to, and what permissions should they have on those resources? FME Server security controls access to resources with role-based access control. Within an organization, users are grouped into roles. FME Server ships with five roles by default. Roles are created for various job functions. Permissions to perform certain operations are assigned to specific roles. Custom roles can also be created for more control over who can access what. For full details see Securing FME Server in the FME Server Documentation. Upgrade and Maintenance You are in control of how your FME Server instance is patched. We only apply security patches to running instances. When you launch an instance, you have three options: 1. No patching: We never apply security patches to the instance. 2. Fully automated: We apply security patches to the instance as they become available, and we will e-mail you if the instance needs restarting at any point. 3. On restart/pause: Whenever you restart or pause the instance, any available security patches are applied. (If this option is selected, keep in mind that if you do not restart the instance often, your server may become ome vulnerable.) Risk Assessments Application design is a combination of secure design practices and regular audits. To ensure the security of FME Cloud and FME Server, we worked with a third-party Certified Information Systems Security Professional (CISSP) and certified by Visa for PCI assessments (QSA, PA-QSA) organization to complete an application and network security audit. This included network vulnerability scanning, penetration testing, and an architecture review. Shared Responsibility Because the customer has a part to play in securing its FME Server instances, Safe Software, our IaaS providers, and our customers jointly share security responsibilities across different domains. safe.com 4

IaaS Provider (AWS) PaaS Provider (FME Cloud) Customer Virtualization layer Network security (including DDOS, spoofing, and port scanning mitigation) Physical and environmental security Operating system security Database security Network security (ports/ protocols) Vulnerability management, including patching and testing Support access Access control FME Server security configuration Network Security All connections are over SSL using high-grade encryption (128-bit, RC4). FME Server uses basic authentication to provide the user name and password to the server. HTTPS is configured on all FME Server instances, which encrypts the data and protects user names and passwords from malicious interception of transactions. On-Premise Deployment of FME Server Some customers require that their FME solution is completely isolated from the Internet, and therefore the Cloud offering is not feasible. FME Server technology can be deployed on-premise. Please contact sales@safe.com for more information. Copyright Safe Software Inc. 2014. All rights are reserved. FME is a registered trademark of Safe Software Inc. All other product names may be trademarks or registered trademarks of their respective owners.