Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

 

General Security

...

Note

This is a draft document

Info

This document describes security details of the services provided by Gebsun.


General Security




GS1Describe your security incident response process (data breach, malware/viruses, unauthorized access, etc.)

We are available XXXXXXXXXXXX

instant backup of:

database

logs

change of passwords

GS2Does security incident response process include appropriate notifications to affected clients/users?Yes, we do inform affected customers so they can take appropriate security steps on their side. For security reasons we do not share information outside the company.
GS3Describe employee security awareness, training and certification process
For security reasons we do not share such information outside the company
All the employees pass security awareness training and all security incidents are assessed by the whole team responsible for affected service.
GS4Are documented security policies issued, updated and acknowledged by all employees?
No
Yes, all employees must pass security awareness training and acknowledge security policy.
GS5Do you have documented vulnerability management process and procedures?
No on application level on OS level our infrastructure provider Amazon EC2 has defined vunerability process please read

We rely on our infrastructure providers for vulnerability management (we do not store any data on our own servers):

aws.amazon
GS6Do you have a documented Privacy Policy? Is there internal monitoring for compliance with Privacy Policies and procedures?

Yes privacy policy is documented.

Privacy policy on OS level

XXXX

We store data on third-party vendors servers and we rely on their privacy policy:

redhat
en/about/privacy-policyPrivacy poolicy in application level
www.atlassian
-policy

No currently there is no need to monitor compliance with security policy on application level.

On OS level our server provider OpenShift does monitoring please read more about that
openshift
policy/security.html
GS7If you are based in the U.S. and collect, use or retain personal data from European Union member countries or Switzerland, do you comply with the U.S. - E.U. Safe Harbor Framework and the U.S. - Swiss Safe Harbor Framework? Have you certified that you adhere to the Safe Harbor Privacy Principles of notice, We
do not collect any personal data or information
are based in EU.
GS8Does your infrastructure or your data centers have current security controls certifications, such as SSAE16/SOC1, SOC2, ISO 27001? Upon request can you provide a recent audit report?We
use as infrastructure provider Amazon's EC2 through RedHat OpenShift. Please read about Amazon EC2 security

...

do not own datacenter. All the infrastructure and data is managed by third-party providers, i.e. OpenShift, mLab and Atlassian.


Corporate Security

   



CS1What physical security controls are implemented to protect unauthorized access to systems and data?

We

use external infrastructure provide Amazon EC2 (via RedHat OpenShift) please read more about security on Amazon Security Page

rely on our infrastructure providers for security management of the data stored on their servers:

CS2What network security controls are implemented to protect unauthorized access to systems and data?
Amazon EC2 security
See above.
CS3Do you have a process for periodic scanning, identifying and remediating security vulnerabilities on servers, workstations, network equipment and applications?
Amazon EC2 security
See above.
CS4Do you conduct regular network and application penetration testing? Upon request can you provide penetration test results or other independent security review results?
Amazon EC2 security
See above.
CS5Does your infrastructure or your data centers have current security controls certifications, such as SSAE16/SOC1, SOC2, ISO 27001? Upon request can you provide a recent audit report?
Amazon EC2 security
See above.
CS6Describe your password policy to include complexity, expiration, reuse and lockout.
Password

Our password policy conforms to

high security standards we

the highest security standards. We use random generated high quality passwords, fingerprints and encrypted storage for development and daily work.

We do not share

such information

any detailed information when comes to expiration.

CS7Describe standard employee issued device security configuration/features. (Login Password, Anti-Virus, Full/Whole Disk Encryption, Administrative Privileges, Firewall, etc.)We do not share security information outside company
CS8Do you have a policy that requires implementing reasonable access security to lock devices (desktop, laptop, mobile)? (i.e. device inactivity auto lock, failed login attempts lockout, screensaver lock, etc.)Yes
CS9Do you expire user sessions after a period of inactivity? Yes
CS10What is your mobile device security policy? How is it enforced?We do not allow to use mobile devices to access infrastructure.
CS11What is your personal device security policy? How is it enforced? 
 

CS12What is your external storage media security policy? How is it enforced?We use external data storage mLab. Please read more about mLab Privacy Policy
CS13Is there a formal process to add, delete or modify user accounts, access and access levels?Yes
CS14Does employee termination result in access termination within 24 hours?Yes
CS15Do you implement network security solutions for network monitoring, internet filtering, and intrusion detection? Please describe.?
CS16Do employees have ability to remotely connect to your protected network? (i.e. VPN)We do not allow to remotely connect to our intranet.
CS17Do you use multiple factors for employee user authentication to access your network (local or remote)??

 


Production Infrastructure

...

 



PS1What physical security controls are implemented to protect unauthorized access to systems and data?
Amazon EC2 security

We rely on our infrastructure providers for security management of the data stored on their servers:

See also CS6 for detailed information regarding protection of our local systems.

PS2What network security controls are implemented to protect unauthorized access to systems and data?
Amazon EC2 security
See above for network
PS3Do you have a process for periodic scanning, identifying and remediating security vulnerabilities on servers, workstations, network equipment and applications?Amazon EC2 security
PS4Do you implement network security solutions for network monitoring, internet filtering, and intrusion detection? Please describe.Amazon EC2 security
PS5Do you conduct regular network and application penetration testing? Upon request can you provide penetration test results or other independent security review results?Amazon EC2 security
PS6Describe Encryption Policy (rest and transport)
 

PS7Describe Encryption Key handling policy
 

PS8Who has access to the Production Encryption Keys
 

PS9How is access granted to Production Encryption Keys
 

PS10Are systems with access to NerdWallet data segregated from other network zones logically and physically?We do not hve access to NerdWallet data
PS11Do you implement network security solutions for network monitoring, internet filtering, and intrusion detection? Please describe.Amazon EC2 security
PS12Are audit trails and logs kept for systems and applications with access to NerdWallet data?No. We do not have access to NerdWallet data
PS13Do you use multiple factors for employee user authentication to access your network (local or remote)??
PS14Describe your password policy to include complexity, expiration, reuse and lockout.We do not share such information for security reasons. We can only make statement that our passwords policy complies to industry standard.
PS15Are systems with access to NerdWallet data segregated from other network zones logically and physically?No