Projectplace: A Secure Project Collaboration Solution



Similar documents
Security, trust and assurance

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Client Security Risk Assessment Questionnaire

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

IBX Business Network Platform Information Security Controls Document Classification [Public]

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Security Controls for the Autodesk 360 Managed Services

FileCloud Security FAQ

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

CONTENTS. PCI DSS Compliance Guide

Clarizen Security White Paper

GiftWrap 4.0 Security FAQ

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

FormFire Application and IT Security. White Paper

Security Policy JUNE 1, SalesNOW. Security Policy v v

StratusLIVE for Fundraisers Cloud Operations

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

CONTENTS. Security Policy

Injazat s Managed Services Portfolio

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

Payment Card Industry Data Security Standard

HIPAA Privacy & Security White Paper

HIPAA Security Matrix

Vendor Audit Questionnaire

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

GoodData Corporation Security White Paper

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

BMC s Security Strategy for ITSM in the SaaS Environment

Security Controls What Works. Southside Virginia Community College: Security Awareness

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

Data Management Policies. Sage ERP Online

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

White Paper. BD Assurity Linc Software Security. Overview

PCI Data Security and Classification Standards Summary

Supplier Security Assessment Questionnaire

Media Shuttle s Defense-in- Depth Security Strategy

Information Security Policy Manual

Secure and control how your business shares files using Hightail

Oracle Cloud Enterprise Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5

Security from a customer s perspective. Halogen s approach to security

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Becoming PCI Compliant

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

Privacy + Security + Integrity

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Understanding Sage CRM Cloud

HIPAA Security COMPLIANCE Checklist For Employers

PCI Requirements Coverage Summary Table

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

A Rackspace White Paper Spring 2010

RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles

LogRhythm and PCI Compliance

Five keys to a more secure data environment

SAS 70 Type II Audits

Securing the Service Desk in the Cloud

Alliance Key Manager Cloud HSM Frequently Asked Questions

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

twilio cloud communications SECURITY ARCHITECTURE

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

PCI Compliance for Cloud Applications

SecureAge SecureDs Data Breach Prevention Solution

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Achieving PCI-Compliance through Cyberoam

Global Partner Management Notice

Egnyte Security Architecture

BKDconnect Security Overview

KeyLock Solutions Security and Privacy Protection Practices

Autodesk PLM 360 Security Whitepaper

Security Information & Policies

Tableau Online Security in the Cloud

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

How to complete the Secure Internet Site Declaration (SISD) form

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Transcription:

Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the industry s most stringent data security standards. How does Projectplace support your needs? Just ask. 1. What third-party audits are performed in the Projectplace environment? In addition to using third-party evaluations of our information security practices and general IT controls, we subject our infrastructure and application to regular vulnerability scans. In addition, annual penetration tests are carried out by independent third parties. We also have these tests repeated whenever we make significant changes to the Projectplace environment. Projectplace has an established information security management system, which was awarded ISO 27001 certification by Intertek, an independent auditor. A copy of this certificate can be viewed here. 2. How do I request to have a security audit of Projectplace conducted? We have an open policy that allows our clients to perform security audits of our service. The audit may be performed either by you or a third party whom you appoint, provided that relevant non-disclosure agreements have been completed and testing pre-conditions including such items as dedicated timeframes and defined test types, have been met. 3. What steps do you take to protect my information from unauthorized network access, such as malicious internal users, external hackers, viruses, and other types of malware? The network containing the Projectplace production servers (the service) is protected by redundant firewalls, intrusion detection systems, and load balancers. The Projectplace service is located on a physically segregated network that requires twofactor authentication for administrative access. We proactively monitor and analyze firewall and systems, using our internal system for security information and event management to identify unusual traffic patterns, potential intrusion attempts, and other security threats. Industry-leading network monitoring services, offered by our co-location facilities provider, deliver another line of defense. In addition, we provide file integrity monitoring and anti-virus software for all our critical systems that malware commonly attempts to exploit.

The security of your data is our priority. Projectplace is ISO27001 certified with role-based access controls, 99.9% uptime, and 256-bit AES encryption both in transit and at rest. Erkan Kahraman, Projectplace CISOe 4. How would I be informed were there an incident or breach that could potentially expose sensitive user information? With an established security incident responses and escalation procedures in place to ensure timely and effective handling of all situations. If there were ever a security incident that could cause a major service disruption or lead to the exposing of client data, you would be informed immediately. 5. What processes are in place to make Projectplace less vulnerable to known web-application attacks? The Projectplace solution is constructed on a multi-tier architecture, consisting of web servers, application servers, and database data storage. Projectplace uses best practice coding standards and an established software development life cycle that incorporates security from the very start; our development team leverages industry guidelines, such as the Open Web Application Security Project (OWASP), Secure Coding Guide, SANS CWE Top 25, and CERT Secure Coding. 6. How is my organization s data segregated from that of other clients? We achieve logical separation of user data through object level access controls and encryption. In the Projectplace solution, each object links to a file individually encrypted, using an AES-256 algorithm. Access controls are implemented at the object level to prevent unauthorized users from accessing data. Production or user data is not used in the Projectplace testing environment. Production and test environments are physically segregated; only dummy user data is used in testing. We do not store user data on backup media; instead, we rely on real-time replication of data (through mirroring and online backups) in redundant systems for availability, hosted at co-location sites. Security controls for the segregation of user data are identical in both environments. 7. How is sensitive data stored and transmitted by the Projectplace service protected? Which encryption methods are used? Data in transit is encrypted with 256-bit AES ciphers and TLS protocols, using a 2048 bit RSA public key for key exchange. User data (including login information) is not sent through unencrypted channels. Details of the Projectplace encryption certificate can be viewed here. All documents stored in the Projectplace solution are automatically encrypted with a unique key, using the AES-256 encryption algorithm. Documents are saved anonymously, rendering identification impossible. Encryption keys are stored separately, with precautions taken to prevent unauthorized access both to encrypted documents and their corresponding encryption keys. User data is not stored in the Projectplace database; only the objects which refer to the encrypted files are stored in the data vault.

8. What staff has access to the production databases? Only a very limited number of system operation team members have access to the production databases through two-factor authentication. According to the Projectplace Master Subscription Agreement, 13.3:...Projectplace shall not be entitled to review Content processed by the Customer via the Services. and...internally, we restrict access to personally identifiable information to employees who need access to the information to do their job. All employees have to execute comprehensive nondisclosure agreements with us. Employees are not allowed to access your project data or uploaded documents. In fact, our extensive encryption procedures effectively prevent anyone (including our employees) to access this information. 9. Which of my data stored in the Projectplace solution can be viewed by Projectplace staff? Only a client s contact information and project membership can be viewed by Projectplace support and sales staff. Projectplace administrators can see project names and associated team members; however, this information is never shared with anyone, nor sold or marketed to any third party, per our Privacy Statement. Projectplace staff is prohibited from accessing your project data or uploaded documentation, and given our strong encryption, is effectively unable to do so within normal daily operations or using existing tools. To obtain access to project data and to recover project files, an administrator must retrieve the encryption key for each individual object and decrypt each file. To prevent unauthorized retrieval of your data, mechanisms for access control through two-factor authentication, logging, and monitoring have been implemented. 10. Where are Projectplace production servers located, and how is access to my assets and/or information controlled, physically secured, and restricted solely to authorized staff? The Projectplace server environment is hosted in two separate co-location facilities, which are operated by industry-leading co-location provider Qbranch 365/24 AB in Stockholm, Sweden. The ISO 20000-certified service organization provides server hall facilities with 24-hour physical security. This includes comprehensive identification, access control and monitoring systems, automatic fire protection, redundant climate control, and fail-over power supply. All physical access to Projectplace data centers operated by QBranch is logged and monitored in real time. Only authorized staff has access. CCTV images from inside the data center are retained for 90 days. 11. What data-backup and data-retention policies apply to the information stored on Projectplace production servers? Multi-step mirroring and online backup routines for production databases and document storage systems have been put into effect. These mirrored data vaults are subject to security control identical to that of the production system. User data is not stored on removable backup media (i.e. tapes). Online backups (snapshots) of the Projectplace database do not contain user data, only object referrers. The backups serve the sole purpose of restoring the whole production system in the unlikely event of multiple server failure. Employees are unable to restore individual projects or documents from these backups. Upon client request, procedures are in place to remove and securely dispose of user data. Procedures for this include deleting encrypted files from the data vault, removing the referrer object and encryption key from Projectplace databases, and overwriting the allocated memory space in the data vault so as to prevent restoration. At the end of their life cycles, all data vault disks are physically destroyed by disk shredders. Projectplace retains user data as long as clients remain members of the service. Projectplace can retain user data indefinitely for active project members, downloadable at any point in time by the user for offline retention.

12. What is the backup schedule for Projectplace servers? How much data could my organization potentially lose? We operate a fully redundant system with real-time database mirroring. All data generated on the Projectplace primary site is continuously backed up to its secondary site via dual fiber connections. Our disaster recovery tests indicate zero data loss. Further, in the event of an actual disaster, we commit to keeping recovery time objective (RTO) and recovery point objective (RPO) to minimum levels that would not have an adverse effect on users. 13. What are the RTO and RPO of the disaster recovery solution for the Projectplace service? The Projectplace production server system is run on a multi-site cluster at two geographically dispersed locations. All critical servers and applications are installed at both locations, which, in the case of a major disruption or disaster, ensure business continuity. All data stored in the primary database servers is mirrored to secondary servers in real time. Secondary servers are located at the second Qbranch co-location facility and are configured to automatically take over production tasks. In the event one of the locations fails, the second site is configured to take over all production tasks with minimal service disruption and capacity loss (estimated RTO less than 30 minutes and RPO approximately 5 minutes). In the event of a major disruption or disaster at one or both production sites, an emergency response team consisting of selected Projectplace staff, is summoned to activate the disaster recovery plan. 14. How long are backups and operating data retained? Unless data is explicitly deleted by the project user, all project information is retained for the duration of the project. Once you initiate project data deletion by emptying a project s waste paper bin or terminating a project that information is no longer retained. Object referrers and their associated encryption keys for deleted objects are deleted from the Projectplace database, which then initiates the garbage collection process, removing the encrypted file from the data vault and overwriting the data. Projectplace does not use backup tapes or other removable media to store user data. Once the data is purged from both primary and secondary systems, it is no longer available. 15. How is my organization s data disposed of at the time of contract termination? Once a user initiates deletion of project data, object referrers and their associated encryption keys are deleted from the Projectplace database. This initiates the garbage collection process, which removes the encrypted files from the data vault and overwrites the data. The process is identical for both primary and secondary data centers. User data is not stored on any removable storage systems or backup media. 16. What controls are implemented and enforced that protect user credentials and ensure a secure login procedure? All users are required to authenticate on the Projectplace solution with a unique username / password combination. These credentials are encrypted when transmitted over the Internet (HTTPS) and when at rest in the Projectplace database. A standard combination of password length and complexity is required of all users, but your organization can customize this to enforce your own security requirements. 17. Does Projectplace support Single Sign On (SSO) for the login procedure? Yes, Projectplace supports Single Sign On (SSO), using the SAML and Active Directory Federation service for enterprise clients. This allows network users to access the Projectplace solution without having to log in separately, with authentication federated from the Active Directory. This reflects the industry s standard procedure for SSO that is widely in use.

18. Can we mitigate our security risk by limiting access to the Projectplace solution through filtering IP addresses? Currently, we do not enable source IP-based access restriction as the Projectplace solution is intended for global access. With nearly a million users worldwide, IP source-address filtering is not a manageable access control for the Projectplace solution. 19. Is Projectplace a PCI DSS-certified merchant/service provider? Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements and guidelines for merchants who store, process, or transmit cardholder data. Payment processing is outsourced to DIBS Payment Services. Cardholder data is not stored, transmitted, or processed by Projectplace. Users are directed to the DIBS secure payment page for online purchasing, and returned to Projectplace upon transaction completion. Since we never touch payment card data, Projectplace is not subject to PCI DSS. DIBS, however, is a PCI DSS-validated service provider for online payment processing. 20. Is Projectplace HIPAA compliant? Our personnel (including administrators) have no access to the information stored in Projectplace databases by our clients and as such we do not store, process, and transmit patient records. It is our clients who are HIPAA compliant, not the solution (Projectplace). 21. Does Projectplace support twostep verification (aka two factor authentication) Yes, Projectplace supports two step verification via SMS based TOTPs for added login security. Have a question you didn t see answered here? Let us know at security@projectplace.com For more information about Projectplace security visit Projectplace.com/security