General Security

This is a draft document

This document describes security details of the services provided by Gebsun.


General Security




GS1Describe your security incident response process (data breach, malware/viruses, unauthorized access, etc.)

We are available XXXXXXXXXXXX

instant backup of:

database

logs

change of passwords

GS2Does security incident response process include appropriate notifications to affected clients/users?Yes, we do inform affected customers so they can take appropriate security steps on their side. For security reasons we do not share information outside the company.
GS3Describe employee security awareness, training and certification processAll the employees pass security awareness training and all security incidents are assessed by the whole team responsible for affected service.
GS4Are documented security policies issued, updated and acknowledged by all employees?Yes, all employees must pass security awareness training and acknowledge security policy.
GS5Do you have documented vulnerability management process and procedures?

We rely on our infrastructure providers for vulnerability management (we do not store any data on our own servers):

GS6Do you have a documented Privacy Policy? Is there internal monitoring for compliance with Privacy Policies and procedures?

Yes privacy policy is documented. XXXX

We store data on third-party vendors servers and we rely on their privacy policy:

GS7If you are based in the U.S. and collect, use or retain personal data from European Union member countries or Switzerland, do you comply with the U.S. - E.U. Safe Harbor Framework and the U.S. - Swiss Safe Harbor Framework? Have you certified that you adhere to the Safe Harbor Privacy Principles of notice, We are based in EU.
GS8Does your infrastructure or your data centers have current security controls certifications, such as SSAE16/SOC1, SOC2, ISO 27001? Upon request can you provide a recent audit report?We do not own datacenter. All the infrastructure and data is managed by third-party providers, i.e. OpenShift, mLab and Atlassian.


Corporate Security




CS1What physical security controls are implemented to protect unauthorized access to systems and data?

We rely on our infrastructure providers for security management of the data stored on their servers:

CS2What network security controls are implemented to protect unauthorized access to systems and data?See above.
CS3Do you have a process for periodic scanning, identifying and remediating security vulnerabilities on servers, workstations, network equipment and applications?See above.
CS4Do you conduct regular network and application penetration testing? Upon request can you provide penetration test results or other independent security review results?See above.
CS5Does your infrastructure or your data centers have current security controls certifications, such as SSAE16/SOC1, SOC2, ISO 27001? Upon request can you provide a recent audit report?See above.
CS6Describe your password policy to include complexity, expiration, reuse and lockout.

Our password policy conforms to the highest security standards. We use random generated high quality passwords, fingerprints and encrypted storage for development and daily work.

We do not share any detailed information when comes to expiration.

CS7Describe standard employee issued device security configuration/features. (Login Password, Anti-Virus, Full/Whole Disk Encryption, Administrative Privileges, Firewall, etc.)We do not share security information outside company
CS8Do you have a policy that requires implementing reasonable access security to lock devices (desktop, laptop, mobile)? (i.e. device inactivity auto lock, failed login attempts lockout, screensaver lock, etc.)Yes
CS9Do you expire user sessions after a period of inactivity? Yes
CS10What is your mobile device security policy? How is it enforced?We do not allow to use mobile devices to access infrastructure.
CS11What is your personal device security policy? How is it enforced? 
CS12What is your external storage media security policy? How is it enforced?We use external data storage mLab. Please read more about mLab Privacy Policy
CS13Is there a formal process to add, delete or modify user accounts, access and access levels?Yes
CS14Does employee termination result in access termination within 24 hours?Yes
CS15Do you implement network security solutions for network monitoring, internet filtering, and intrusion detection? Please describe.?
CS16Do employees have ability to remotely connect to your protected network? (i.e. VPN)We do not allow to remotely connect to our intranet.
CS17Do you use multiple factors for employee user authentication to access your network (local or remote)??


Production Infrastructure




PS1What physical security controls are implemented to protect unauthorized access to systems and data?

We rely on our infrastructure providers for security management of the data stored on their servers:

See also CS6 for detailed information regarding protection of our local systems.

PS2What network security controls are implemented to protect unauthorized access to systems and data?See above for network
PS3Do you have a process for periodic scanning, identifying and remediating security vulnerabilities on servers, workstations, network equipment and applications?Amazon EC2 security
PS4Do you implement network security solutions for network monitoring, internet filtering, and intrusion detection? Please describe.Amazon EC2 security
PS5Do you conduct regular network and application penetration testing? Upon request can you provide penetration test results or other independent security review results?Amazon EC2 security
PS6Describe Encryption Policy (rest and transport)
PS7Describe Encryption Key handling policy
PS8Who has access to the Production Encryption Keys
PS9How is access granted to Production Encryption Keys
PS10Are systems with access to NerdWallet data segregated from other network zones logically and physically?We do not hve access to NerdWallet data
PS11Do you implement network security solutions for network monitoring, internet filtering, and intrusion detection? Please describe.Amazon EC2 security
PS12Are audit trails and logs kept for systems and applications with access to NerdWallet data?No. We do not have access to NerdWallet data
PS13Do you use multiple factors for employee user authentication to access your network (local or remote)??
PS14Describe your password policy to include complexity, expiration, reuse and lockout.We do not share such information for security reasons. We can only make statement that our passwords policy complies to industry standard.
PS15Are systems with access to NerdWallet data segregated from other network zones logically and physically?No