PRIVATE, TRUSTWORTHY AND SCALEABLE Providing Secure Remote Service and Support. white paper

Similar documents
Securing the Service Desk in the Cloud

BMC s Security Strategy for ITSM in the SaaS Environment

NetSuite Data Center Fact Sheet

Secure, Scalable and Reliable Cloud Analytics from FusionOps

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Level I - Public. Technical Portfolio. Revised: July 2015

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

White Paper. BD Assurity Linc Software Security. Overview

Security Policy JUNE 1, SalesNOW. Security Policy v v

Security & Infra-Structure Overview

Understanding Sage CRM Cloud

Powering the Cloud Desktop: OS33 Data Centers

Security Practices, Architecture and Technologies

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

SAS 70 Type II Audits

GoodData Corporation Security White Paper

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Autodesk PLM 360 Security Whitepaper

IBX Business Network Platform Information Security Controls Document Classification [Public]

Cloud Contact Center. Security White Paper

GiftWrap 4.0 Security FAQ

Five keys to a more secure data environment

SERENA SOFTWARE Serena Service Manager Security

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Altus UC Security Overview

Famly ApS: Overview of Security Processes

CHIS, Inc. Privacy General Guidelines

How To Secure Your Data Center From Hackers

Privacy + Security + Integrity

Cloud Contact Center. Security White Paper

An Overview of the SaskTel Hosted Contact Centre Solution Design and Delivery Principles, and Core Architecture

Anypoint Platform Cloud Security and Compliance. Whitepaper

Connected Product Maturity Model

TOP SECRETS OF CLOUD SECURITY

Security Controls for the Autodesk 360 Managed Services

White Paper How Noah Mobile uses Microsoft Azure Core Services

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Building and Deploying Enterprise M2M Applications with Axeda Platform

Birst Security and Reliability

SITECATALYST SECURITY

Perceptive Software Platform Services

Security Whitepaper: ivvy Products

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

Secure and control how your business shares files using Hightail

Injazat s Managed Services Portfolio

CONTENTS. Security Policy

SaaS Security for the Confirmit CustomerSat Software

Security and Managed Services

END-TO-END SECURE CLOUD SERVICES

PRIVACY, SECURITY AND THE VOLLY SERVICE

White Paper: Librestream Security Overview

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

BroadData Unified Meeting Security Whitepaper v4.2

SOFTWARE AS A SERVICE (SaaS)

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Enterprise level security, the Huddle way.

FormFire Application and IT Security. White Paper

Time to Value: Successful Cloud Software Implementation

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Security & Infrastructure White Paper

Develop HIPAA-Compliant Mobile Apps with Verivo Akula

Cloud Management. Overview. Cloud Managed Networks

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups

StratusLIVE for Fundraisers Cloud Operations

MIGRATIONWIZ SECURITY OVERVIEW

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

SNAP WEBHOST SECURITY POLICY

Making the leap to the cloud: IS my data private and secure?

RSS Cloud Solution COMMON QUESTIONS

Addressing Cloud Computing Security Considerations

Hosted Testing and Grading

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

KeyLock Solutions Security and Privacy Protection Practices

Paxata Security Overview

Projectplace: A Secure Project Collaboration Solution

IBM Connections Cloud Security

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Microsoft Azure. White Paper Security, Privacy, and Compliance in

Axeda Platform. Technical Overview. white paper

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Security Information & Policies

Security Considerations

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

Access Control patient centric selective sharing Emergency Access Information Exchange

White paper. Implications of digital certificates on trusted e-business.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Security Overview Enterprise-Class Secure Mobile File Sharing

Symantec Enterprise Vault.cloud Overview

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Managed Security Services for Data

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability

ProjectManager.com Security White Paper

How To Protect A Web Application From Attack From A Trusted Environment

Transcription:

PRIVATE, TRUSTWORTHY AND SCALEABLE Providing Secure Remote Service and Support white paper

EXECUTIVE SUMMARY A Methodology for Providing a Secure Connected Products Service Security is a primary concern of Axeda s customers largely device manufacturers and end-customers that deliver and use connected products. These customers require a proven, cloud-based solution that protects them against viruses and hackers, supports their intelligent devices without major end-user modifications, and extends their current network security model so that they can meet critical certification and compliance requirements. Since the manufacturer s devices are connected to their customer networks, the end-customers also need to be assured that the connected product supports their security model, provides granular control over user access, and offers easy-to-use audit and tracking capabilities. Leading device manufacturers across many industries are delivering business-critical connected products with the Axeda Machine Cloud Service, the most advanced cloud-based service and software for managing connected products and implementing innovative IoT applications. Delivered via our ISO 27001 certified and SSAE 16/SOC 2 audited on-demand centers, the Axeda Machine Cloud Service addresses the security requirements of manufacturers and their end-customers, while enabling them to grow revenue, reduce costs, increase customer satisfaction, and manage risk without additional IT burden and investment. The Axeda Machine Cloud Service connects manufacturers and their devices within their customers environments. Because these devices often track patient records, financial data, and other types of private and protected information, security and compliance capabilities are among the most important requirements evaluated in any connected product solution. This paper details how Axeda and the Axeda Machine Cloud Service meet the requirements of security-concerned manufacturers and their end-customers. 2 // Providing Secure Connected Products

Providing Secure Connected Products An End-End Security Strategy Axeda incorporates an end-to-end security strategy covering all levels, including network, application, user, and data security, as well as security training for its employees, and a number of trained Certified Information Systems Security Professional (CISSP)staff. Axeda has attained ISO 27001:2005 certification, supporting the company s focus on delivering the highest levels of security, performance, and availability of the Axeda Machine Cloud Service. The Axeda Machine Cloud Service is designed to address key information security concerns with features that: Maintain network security at customer sites. The Axeda solution leverages your customer s existing security infrastructure, utilizing our patented Firewall- Friendly communication. Conceal data from unauthorized parties. All communication between you and your customers is kept secure using Secure Socket Layer (SSL) encryption the same method banks use for secure online transactions. Provide a secure and scalable on-demand infrastructure via secure hosting partners. Our ISO 27001:2005-certified data centers undergo an annual SSAE-16 SOC 2 audit and is built on state-of-the-art equipment, technology investments, and operational expertise. Ensure that system users are authenticated. All access to the system is centrally controlled, requiring password authentication. All user actions are fully audited for traceability. Limit each user to specific data, views, and actions. Once authenticated, user actions are limited to the products for which they are responsible, and the level of access appropriate to their roles. Axeda Machine Cloud Service End-to- End Security Highlights: Patented, Firewall-Friendly communications HTTPS, PKI, and up to 256-bit AES encryption data protection ISO 27001 certified and SSAE 16 SOC2 audited, field-proven ondemand centers Proactive internal vulnerability scans Externally audited and verified penetration tests axeda.com // t +1.508.337.9200 // 3

AXEDA S COMMITMENT Axeda believes that privacy and security are of the highest importance to its customers and their end-user customers. Axeda maintains the following security principles: ċċprotect the integrity of the system - network, equipment, and data ċċtrack access and activity to achieve regulatory compliance ċċprovide flexibility and control to enforce business policies ċċsupport the security capabilities within the customer s current network security model ċċachieve official certification through audits to provide customers confidence in the capabilities of both the technology and vendor Secure and Scalable On-Demand Centers Axeda on-demand center operations team s process is certified to meet the ISO Standard 27001 Information Security Management System (ISMS) framework. These well- documented operational standards include the typical components of: Incident management Security monitoring External audits validating our security methodology and processes Security awareness and training programs Risk management and business continuity planning Change and configuration management Capacity planning Proactive threshold monitoring of core resources Given each of these processes is governed by the ISO Standard 27001 ISMS and is aligned with Information Technology Service Management (ITSM) best practices, Axeda s customers can be assured their products and data are secure. The ITSM process has been thoughtfully designed as a component of the Information Technology Infrastructure Library (ITIL) standard. Axeda s secure hosting partner Axeda s secure hosting partner Savvis delivering the following advantages: Auditable Security SSAE 16 Certified - Your valuable IT assets are safeguarded against man-made and natural disasters. Our data center locations are designed to withstand extreme weather events and prevent unauthorized contacts from accessing your data center space. Savvis offers a wide range of Managed Security Services that help your organization to prevent potential data compromises, network breaches and unauthorized system access. Robust Protection from Physical Harm - Savvis prides itself on building advanced, cutting-edge, multi-level physical security into every data center to ensure that your infrastructure isn t compromised. Savvis also provides an extensive array of sophisticated managed security services that supplement our standard security measures. Standard Data Center Physical Security Measures - On-premise security guards Security systems on the building exterior: cameras, false entrances, vehicle blockades, customized parking lot designs, bulletproof glass/walls and unmarked buildings Biometric systems, including palm scanners Numerous security cameras with digital recorders Portals and person-traps that authenticate only one person at a time Power - To protect your technology investment and deliver the infrastructure 4 // Providing Secure Connected Products

Providing Secure Connected Products availability you require, we utilize power management, power monitoring, advanced fire suppression, and HVAC (Heating, Ventilation & Air Conditioning) systems. Savvis data centers are designed to prevent single points of failure that can reduce availability of your infrastructure and impact the quality of end-users experiences. Savvis most critical responsibility to customers is to keep their infrastructure functioning, despite potential disruptions such as lengthy power outages. To maintain power availability, all of Savvis data centers utilize high-capacity, redundant generators that guarantee power availability even during metrowide power outages. And, due to short-notice diesel generator refueling contracts with multiple vendors at each data center location, the electricity backup capabilities are extensive. This permits Savvis to supply necessary power to organizations that require around-the-clock infrastructure availability, such as online retailers, global financial services companies and healthcare providers. HVAC - The Savvis data centers allow for proper heat dissipation, permitting their sites to operate within an acceptable temperature range. To maintain the flow of air conditioning to the data center infrastructure, Savvis employ s redundant (N+1) HVAC units within each of their locations. The HVAC units are powered by normal and emergency electrical systems, in order to maintain their availability. Additionally, cold water tanks are installed that keep air conditioning units functioning when there is a requirement to transition from direct power to generator power during emergencies. Fire suppression - Savvis employs the latest fire suppression methods. To detect smoke from the earliest stage of combustion, fire suppression systems are installed at each of Savvis data center locations. The systems utilize state-of-the-art "sniffer" systems, augmented by heat detection and drypipe sprinkler systems. Seismic engineering - Savvis has performed extensive seismic engineering to keep potential disasters from interrupting business operations. In regions that are prone to seismic activity, they provide the necessary level of bracing. Seismic isolation equipment is installed to cushion facilities against movement, in addition to installing earthquake bracing on all equipment racks. And, racks at all of Savvis data centers not just those in traditional earthquake zones are anchored to the concrete slab below the site s raised floor. Network Connectivity - Savvis high-availability network and carrier connections provide strong global reach, allowing customers quick and convenient access. Colocation Services are offered in North America, Europe, and Asia, permitting the addressing of specialized business continuity and disaster recovery objectives. Savvis leverages geographical diversity to provide customers with failover and redundancy capabilities with many of their services. axeda.com // t +1.508.337.9200 // 5

AXEDA SECURITY FEATURES AND BENEFITS Network Security FEATURES ċċpatented, Firewall-Friendly technology is based on Web Services standards, including HTTPS, SOAP, and XML ċċaxeda Agent initiates all communication, so products do not require public IP addresses and are not visible from outside the firewall. BENEFITS ċ ċ Customers don t have to make changes to firewall settings or proxy servers, easing deployment and addressing compliance objectives. Industry Leadership - Savvis been offering secure hosting services to companies for more than a dozen years and continue to build on this expertise in areas of cloud computing and beyond. This includes membership in: International Standards Organization (ISO) PCI Standards Council, the Information Security Audit and Control Association (ISACA) Information Systems Security Association (ISSA) Institute of Electrical and Electronics Engineers (IEEE) Computer Security Institute (CSI) Application Security Perspective Above the Infrastructure MANUFACTURER S REQUIREMENTS FOR CONNECTED PRODUCT SECURITY The Axeda Machine Cloud Service meets the most stringent security requirements of manufacturers and end-customers so that they can achieve broad adoption and maximum use of connected products instilling confidence that their connections are secure and private. Some of the most common manufacturer requirements include: Enterprise proven design Connecting any computer to the Internet raises security concerns, and connecting intelligent devices is no different. Whether hackers are trying to harm a device with corrupt data or viruses, steal data traveling between the device and manufacturer, or gain unauthorized access to critical information, a connected product solution must guard against these and other threats. Support for multiple devices Manufacturers need to securely support a nearly infinite number of device types and complex customer configurations without requiring major end-user changes. END-CUSTOMER REQUIREMENTS FOR CONNECTED PRODUCTS Intelligent devices are connected to your customers networks. Each customer has their own security policy and network protection in the form of firewalls, proxy servers, and addressing schemes. A device connected to their network will be protected behind these layers of security. If a connected product offering requires changes to your customer s network protection, it will likely fail to gain acceptance. Because of this, it is important to consider the requirements of the end-customer, including: Maintain current security model The manufacturer s device must support the way that the organization manages security operations, policies, or procedures, and should adhere to accepted industry standards. Control user access In line with the customer s security model, the manufacturer s device must provide the customer not the manufacturer with granular control and set policies on what actions can be performed on the device such as data collection and software updates, and when those 6 // Providing Secure Connected Products

Providing Secure Connected Products actions can be performed. These policies need to be centrally defined for all devices at a customer location. Audit and track activity Policy and regulatory compliance requirements dictate that the system must make auditing and tracking all user and administration activity easy. Axeda delivers the performance, flexibility, and scalability required to meet the needs of the broadest range of device manufacturers by providing the widest range of data protection safeguards and security features. NO CHANGES REQUIRED TO IT OR SECURITY INFRASTRUCTURES Axeda s patented Firewall-Friendly technology provides two-way communication based on Web Services standards including Hypertext Transfer Protocol (HTTPS), Simple Object Access Protocol (SOAP), and extensible Markup Language (XML). No changes to the IT security infrastructure of the end customer are required to support remote monitoring and diagnostics. In addition, communication between the data center of the manufacturer or service provider and the customer site is encrypted using industry-standard, 2048-bit key encryption and up to 256-bit AES content encryption. AXEDA SECURITY FEATURES AND BENEFITS System and Data Security FEATURES ċċssl encryption supports up to 256 bits and mutual authentication using bidirectional digital certificates. BENEFITS ċċonly authorized parties have access to designated devices and data. Endcustomers can limit access, views, and even actions based on the user s role, which gives them control over users and actions. ċċproven, standards-based communications help with compliance with regulatory requirements. FIGURE 1. AXEDA PATENTED FIREWALL-FRIENDLY COMMUNICATIONS WIRELESS SECURITY To meet the needs of wireless connectivity, Axeda has developed the Adaptive Mchine Messaging Protocol (AMMP), a messaging protocol for use between a wireless IoT device or agent and the Axeda Platform. Using a RESTful API, AMMP provides a semantic structure for IoT information exchange and leverages HTTPS/TLS as the means for ensuring transmission security between an edge device and the Axeda Machine Cloud. axeda.com // t +1.508.337.9200 // 7

AXEDA SECURITY FEATURES AND BENEFITS User and Application Security FEATURES ċċaccess to the system is centrally controlled and authenticated against an enterprise LDAP system. ċċstrong passwords are enforced with a combination of letters, numbers, and symbols. ċċall remote access activity is tracked and recorded. ESTABLISH AND ENFORCE DEVICE SECURITY AND DATA PRIVACY POLICIES The Axeda Policy Server is a security component of Axeda that enables authorized customer administrators to establish and enforce the privacy policy for all of their devices in a single place. The Axeda Policy Server is a software application that resides on the customer s network, providing a comprehensive and granular set of permission settings that continuously governs behavior. This control applies to every kind of Axeda activity, including handling remote diagnostics, sending software upgrades, retrieving log files, running sessions, and executing commands and scripts. Control can be automatic, based on the set policy, or configured to notify the customer that an action request is pending. Policies can also be scoped to time windows and to particular remote users. BENEFITS ċ ċ End-users have a comprehensive audit trail when analyzing vendor activity for compliance needs.. FIGURE 2. AXEDA COMMUNICATIONS METHODS EASILY MANAGED ENTERPRISE USER AUTHENTICATION AND ACCESS CONTROL The Axeda Platform uses the Lightweight Directory Access Protocol (LDAP) standard to authenticate users. IT departments have adopted LDAP as the common platform for managing users across all business applications, including Enterprise Resource Planning (ERP), Customer Relationship Management (CRM), and Supply Chain Management (SCM) systems. User access control is addressed through activity-based access control and device-based access control. These methods are combined in a wide variety of ways to allow users to do their jobs effectively while protecting access to sensitive information. Activity-based access control enables the system administrator to assign and classify users in Axeda, and define the activities that can be performed. Each user group is given controlled access at the Axeda application, page, and function levels. 8 // Providing Secure Connected Products

Providing Secure Connected Products Device-based access control provides a method for defining the specific devices accessible to each user group. This method of control limits the view of device information to only those devices for which a user is responsible. SECURE COMMUNICATIONS AND DATA CONFIDENTIALITY Axeda implements industry best practices for encrypting its message traffic. In addition to providing support for SSL certificates from globally recognized certificate authorities, Transport Layer Security (TLS) is used to provide security at the communications level. The content of the messages are then further secured using the Advanced Encryption Standard (AES) 128 algorithm, and the RSA 2048 algorithm is used for key exchanges. PROVEN DEPLOYMENTS Axeda is deployed around the world by more than 150 device manufacturers in a range of industries, including homeland security, medical, life sciences, information technology, telecommunications, print and imaging, kiosks, semiconductor, industrial, and building automation. axeda.com // t +1.508.337.9200 // 9

Providing Secure Connected Products Summary Device manufacturers throughout the world are providing connected products to their customers using the Axeda M2M Cloud Service. Axeda would not hold the industry leadership position without rigorously incorporating security principles and standards in the design and operation of the Axeda infrastructure and services. A top-down driven priority at Axeda, stringent security enables its customers to achieve their connected product goals securely and efficiently. www.axeda.com // 25 Forbes Blvd. Suite 3 // Foxboro, MA 02035 USA // t +1.508.337.9200 // f +1.508.337.9201 Follow us online: Axeda provides the most advanced cloud-based service and software for managing connected products and machines and implementing innovative Machine-to-Machine (M2M) and Internet of Things (IoT) applications. Our customers use the Axeda Machine Cloud to turn machine data into valuable information, to build and run innovative M2M and IoT applications, and to optimize business processes by integrating machine data. 2014 Axeda Corporation. Axeda is a registered trademark of Axeda Corporation. Adaptive Machine Message Protocol, Axeda Agents, Axeda Connected Access, Axeda Connected Asset Management, Axeda Connected Configuration, Axeda Connected Content, Axeda Connected Machine Management Applications, Axeda Connected Service, Machine Cloud, Machine Streams, and Firewall-Friendly are either trademarks or registered trademarks of Axeda Corporation. All other trademarks are either the property of Axeda Corporation or of their respective owners.