Security considerations
Physical security
- We're hosting in the datacenter "Munich East" of our datacenter provider noris.
- The datacenter holds multiple certifications:
https://www.noris.de/wp-content/uploads/Rechenzentrum-Muenchen-MUC5-datacenter-Leistungsmerkmale.pdf
Show archive.org snapshot
(PDF in german)
- ISO/IEC 27001: Information security management system
- ISO 27001: Certification of basic IT protection
- ISO/IEC 20000-1: Service management system
- ISO 9001: Quality management system
- EN 50600: Construction and operation of secure data centers
- VdS 3406: Object-specific safety management system
- PCI DSS: Payment Card Industry Data Security Standard
- ISAE 3402 Type II: Internal control system based on COBIT 5
- TISAX
- The data center's protection system includes fire safety, redundant network connections, redundant power supply, security on-site and rapid support with incidents.
Multi-tiered network security
- All servers are configured to have their services available only on an internal interface but not on the public internet. Configuration management ensures both service and firewall configuration.
- Network traffic in the internal network is restricted by firewalls and separated networks to the servers of individual customers. Customer network areas are separated from each other.
- Ingress HTTP traffic for web applications goes through our hardened load balancer/reverse proxy service to reach the destination application servers.
Operating systems
- We apply a hardened default configuration on the operating systems via Puppet
- Rapid handling of security vulnerabilities and quick patching is part of all security considerations.
- We follow all relevant security newsfeeds and information sources.
- We follow update feeds of our Long Term Support operating systems.
- We follow update feeds of all relevant services not provided by the operating system.
- Upon discovery of security vulnerabilities we assess criticality, consider impact of emergency maintenance to affected services, deploy mitigations and apply security updates at the next possible opportunity.
- Regular security updates, monitoring, handling and patching of security vulnerabilities.
- Server access for deploying new software releases is generally limited to SSH.
- We restrict access to asymmetric keys; insecure and potentially guess-able passwords are prohibited.
- Brute force login attempts are detected and stopped.
- Privileged access to servers is restricted to administrative personnel and is logged.
- Logs are shipped to dedicated logging servers to allow effective analysis and ensure integrity in case of security incidents.
- Service and operating system configuration is monitored and enforced by our configuration management software (Puppet).
Data and services
- Customer infrastructure is generally hosted on dedicated virtual machines that are not shared with other customers.
- Services inside VMs are restricted to only necessary permissions.
- Software hosted for customers are separated from other software components according to agreements. Different products are isolated from each other by the permission concept on the file system level.
- Data storage and database access is restricted to internal, customer specific network areas with restrictions on firewall and permission level.
- We perform regular backups that can't be destroyed, manipulated or encrypted by the system that is being backed up: https://makandracards.com/opscomplete/44762-backup
- Backups are kept in a physically separate location for protection from fire or other physical hazards.
- Backups of customer data are encrypted with individual keys, different from those of other customers.
- Backups are checked for integrity regularly. Recovery tests happen weekly.
Security incidents
- All servers and services are monitored for correct operation and anomalies are detected.
- Anomalies in metrics, notifications or logs are handled by an on call operations engineer.
- Incident response follows established procedures. All operations engineer on staff are trained in these procedures.
- Escalation, early notification to customers and final reports to the customer are part of the procedures.
Certifications
We hold security related certifications:
- DCSO Cloud Vendor Assessment (CVAT)
- VdA tisax, including high protection needs and data protection
Our datacenter provider Noris holds certifications that are can be retrived from their website Show archive.org snapshot