Anypoint Platform Cloud Security and Compliance. Whitepaper



Similar documents
With Eversync s cloud data tiering, the customer can tier data protection as follows:

PATCH MANAGER what does it do?

THE BLUENOSE SECURITY FRAMEWORK

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Using AWS in the context of Australian Privacy Considerations October 2015

twilio cloud communications SECURITY ARCHITECTURE

Building Energy Security Framework

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Clever Security Overview

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Live Guide System Architecture and Security TECHNICAL ARTICLE

CloudCheck Compliance Certification Program

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

Security Considerations

The Education Fellowship Finance Centralisation IT Security Strategy

FMCS SECURE HOSTING GUIDE

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Security Information & Policies

Amazon Web Services: Risk and Compliance January 2013

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

An Agile and Scalable Mobile Workplace

Cloud Security Trust Cisco to Protect Your Data

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Securing Amazon It s a Jungle Out There

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

White Paper How Noah Mobile uses Microsoft Azure Core Services

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Helping people make better decisions DATA SECURITY POLICY. Kiilakiventie 1, Oulu, Finland tel:

Famly ApS: Overview of Security Processes

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

StratusLIVE for Fundraisers Cloud Operations

HEC Security & Compliance

GoodData Corporation Security White Paper

Amazon Web Services: Risk and Compliance July 2012

Amazon Web Services: Risk and Compliance January 2011

Security Overview Enterprise-Class Secure Mobile File Sharing

PCI Requirements Coverage Summary Table

KeyLock Solutions Security and Privacy Protection Practices

BMC s Security Strategy for ITSM in the SaaS Environment

Addressing Cloud Computing Security Considerations

Microsoft s Compliance Framework for Online Services

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

Cloud models and compliance requirements which is right for you?

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

An Oracle White Paper May Oracle Integration Cloud Service (ICS) Security & Compliance

Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager

Is it Time to Look at an Ektron Managed Cloud Strategy? Copyright 2014 Ektron, Inc.

PCI Requirements Coverage Summary Table

Autodesk PLM 360 Security Whitepaper

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

Logz.io See the logz that matter

Security Practices, Architecture and Technologies

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

How To Create A Walkme.Com Walkthrus.Com Website And Help With Your Website Or App On A Pc Or Mac Or Ipad (For Pc) Or Mac (For Mac) Or Ipa (For Ipa) Or Pc

Securing the Microsoft Cloud

Client Security Risk Assessment Questionnaire

WALKME WHITEPAPER. WalkMe Architecture

Amazon Web Services: Risk and Compliance July 2015

Tenzing Security Services and Best Practices

Intel Enhanced Data Security Assessment Form

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Paxata Security Overview

VMware vcloud Air Security TECHNICAL WHITE PAPER

Cloud Security and Managing Use Risks

The Anti-Corruption Compliance Platform

Best Practices for PCI DSS V3.0 Network Security Compliance

How To Achieve Pca Compliance With Redhat Enterprise Linux

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Payment Card Industry Data Security Standard

Security Issues in Cloud Computing

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

How To Protect Your Cloud Computing Resources From Attack

Intermedia s Dedicated Exchange

CONTENTS. PCI DSS Compliance Guide

Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples

SERENA SOFTWARE Serena Service Manager Security

Security Controls for the Autodesk 360 Managed Services

Pharma CloudAdoption. and Qualification Trends

Information Security Management System for Microsoft s Cloud Infrastructure

Digi Device Cloud: Security You Can Trust

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Birst Security and Reliability

Application Security Best Practices. Matt Tavis Principal Solutions Architect

SECURITY IN A HOSTED EXCHANGE ENVIRONMENT

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Transcription:

Anypoint Platform Cloud Security and Compliance Whitepaper 1

Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security. MuleSoft s Anypoint Platform is designed to be a secure platform for our customers. Anypoint Platform spans SOA, SaaS Integration and APIs. This whitepaper covers the security and compliance of MuleSoft s cloud services, namely CloudHub and API Platform. MuleSoft s approach to cloud security is two-pronged: (a) we actively and consciously avoid inspecting, storing, manipulating, monitoring, or otherwise directly interacting with sensitive customer data; and (b) we provide a highly secure environment in which customers can perform sensitive data manipulations. MuleSoft s dedicated security team follows industry best practices, runs internal security audits and maintains policies that span operations, data security, passwords and credentials, and secure connectivity. As all our cloud services are built on the AWS platform, we rely on Amazon s leading physical and network security. MuleSoft also enforces operation controls based on industry standard best practices for public cloud services, including, but not limited to: Principle of least privileged access Role based access controls Data security (not storing sensitive data, encrypting data at rest, and more) Regular audits Customer advisories and established escalation processes Penetration testing MuleSoft ensures compliance with multiple industry standards and regulations through regular audits. We can provide an SSAE16 SOC2 report, as well as PCI level-1 and HiTrust attestations of compliance, upon request. Operations MuleSoft s goal is to provide a secure platform where customers can operate, while giving customers the freedom and confidence to do so without our examination or intervention. In order to do this, MuleSoft follows industry best practices for operational processes to provide a secure environment for customers. These include, but are not limited to: Comprehensive security policies Least privilege access Secure virtual private cloud environments Regular application and network penetration testing and vulnerability scanning Regular external reviews of our security program and audits of adherence to security compliance standards Logging and alerting of platform-level security events Strong authentication for administrative sessions 2

Secure software development lifecycle (SLDC) methodology and standards Security incident response and disaster recovery procedures Tight controls and restrictions on administrative rights Data Security When the Anypoint Platform is run as a cloud service, MuleSoft transmits data for customers, though we are data agnostic. MuleSoft does not inspect, store, manipulate, monitor or otherwise interact directly with customer data payloads. MuleSoft understands that the data customers are transmitting should be treated carefully to mitigate any security risks. To this end, customers maintain control over their data, configuration and workers. CloudHub workers serve as a secure instance for transmitting and processing data by giving each application its own independent virtual machine. Each worker is fully isolated from other tenants. Passwords and Credentials All account passwords and credentials are stored in a non-reversible secure format in the database. Data encryption as a feature of the platform can also be enabled. Customers can store credentials for their own services inside the Mule Credential Vault. CloudHub customers can also use the Secure Environment Variables feature to ensure that sensitive configuration, such as passwords or keys, are stored in an encrypted form on our servers. Facilities and Network Amazon is MuleSoft s cloud provider and the Amazon Web Service (AWS) cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. AWS s world-class, highly secure data centers utilize state-of-the-art electronic surveillance and multi-factor access control systems. Data centers are staffed 24x7 by trained security guards, and access is authorized strictly on a least-privileged basis. Environmental systems are designed to minimize the impact of disruptions to operations. Multiple geographic regions and availability zones allow you to remain resilient in the face of most failure modes, including natural disasters or system failures. AWS has achieved ISO 27001 certification and has been validated as a Level 1 service provider under the Payment Card Industry (PCI) Data Security Standard (DSS). AWS undergoes annual SOC 1 audits and has been successfully evaluated at the Moderate level for Federal government systems as well as DIACAP Level 2 for DoD systems. AWS infrastructure is in alignment with the following SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II), SOC2, PCI DSS Level 1, ISO 27001, and ITAR. 3

More detail on AWS security can be found here. Secure Connectivity MuleSoft s platform includes support for secure protocols and provides tools to build secure services on our platform. MuleSoft recommends that customers use these protocols and tools to secure their services to secure their business. These include, but are not limited to: SSL PGP payload encryption/decryption OAuth2 WS-Security SAML CloudHub also provides built in security for communication from the cloud to onpremises application, databases, and services using the Virtual Private Cloud (VPC) offering. VPC enables customers to connect to its corporate data centers (whether onpremises or in other clouds) to CloudHub as if they were all part of a single, private network through an IPsec or SSL based VPN. Data Sovereignty The Anypoint Platform provides customers with the opportunity to configure their integrations to run in different regions of the world so customers can be compliant with local regulations. When a customer configures an integration to run in a specific region, data is only transmitted and processed within that region. These regions include the US, EU, Asia Pacific, and South America. For example, CloudHub allows MuleSoft customers to transmit their customer s payload data in a manner consistent with the EU Data Protection Directive by using CloudHub s EU region. For more information, please see the documentation. Third Party Certification In order to reassure our customers about our security posture, MuleSoft pursues multiple security and compliance standards, all subject to external validation. By continually auditing our environment, controls and practices against different standards from different industries, we are able to deliver ultimate peace of mind with respect to how we handle and protect our customers data. 4

SSAE 16 MuleSoft can provide an SSAE16 SOC2 report upon request. From the AICPA s website: Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy These reports are intended to meet the needs of a broad range of users that need to understand internal control at a service organization as it relates to security, availability, processing integrity, confidentiality and privacy. These reports are performed using the AICPA Guide: Reporting on Controls at a Service Organizations Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy and are intended for use by stakeholders (e.g., customers, regulators, business partners, suppliers, directors) of the service organization that have a thorough understanding of the service organization and its internal controls. These reports can form an important part of stakeholders: Oversight of the organization Vendor management program Internal corporate governance and risk management processes Regulatory oversight HiTrust MuleSoft is a registered compliant HiTrust service provider. The registration letter from the HiTrust council can be provided upon request. From the HiTrust Alliance website: Developed in collaboration with healthcare and information security professionals, the HITRUST CSF rationalizes healthcare-relevant regulations and standards into a single overarching security framework. Because the HITRUST CSF is both risk- and compliancebased, organizations can tailor the security control baselines based on a variety of factors including organization type, size, systems, and regulatory requirements. By continuing to improve and update the CSF, the HITRUST CSF has become the most widely adopted security framework in the U.S. healthcare industry. This commitment and expertise demonstrated by HITRUST ensures that healthcare organizations leveraging the framework are prepared when new regulations and security risks are introduced. 5

PCI Compliance MuleSoft is a level-1 PCI service provider. An Attestation of Compliance (AoC) can be provided upon request. From the PCI Council s website: PCI DSS is the global data security standard that any business of any size must adhere to in order to accept payment cards, and to store, process, and/or transmit cardholder data. It presents common-sense steps that mirror best security practices. On-premises Security Anypoint Platform can be deployed in the cloud (CloudHub) or on-premises (Mule ESB). When a customer chooses to run Anypoint Platform on-premises, MuleSoft systems do not interact with customer data at all. Customers configure and run the software and handle all storing, processing and transmitting of data directly, without interference from MuleSoft. As MuleSoft does not process, store or transmit customer data, information security standards are dictated by how the customer s environment is managed. MuleSoft ESB can also be modified to support a FIPS compliant environment. Anypoint Platform on-premises is a solid part of our customers secure and compliant environments. More Information MuleSoft is dedicated to ensuring that customers can meet their security and compliance goals with our platform. For more information or answers to questions about MuleSoft security and compliance, please contact info@mulesoft.com. 6