UK Government Cloud Security Principles

From All n One's bxp software Wixi

Jump to: navigation, search

1 Introduction

At All n One we provide professional, efficient and most importantly secure systems to our clients. This document references All n One's compliance to UK government cloud security principles - UK Government Cloud Principles]


2 Sections

2.1 Data in transit protection

Consumer data transiting networks should be adequately protected against tampering and eavesdropping via a combination of network protection and encryption.


All n One utilises SunGard's hosting environment in Parkwest business park Dublin. In this environment SunGard use cisco 5510 firewalls for network protection and Cent OS virtual load balancers utilizing TLS negotiation so we can offer TLS 1.2 to users using the latest browsing software and older versions of TLS for legacy software. (IE6 etc.) We also complete vulnerability tests to ensure All n One's cloud security. For additional information on bxp's end to end encryption please view the following link - Bxp_-_End_to_End_encryption_and_High_Availability

2.2 Asset protection and resilience

Consumer data, and the assets storing or processing it, should be protected against physical tampering, loss, damage or seizure.


All n One's client data is stored in database servers in Sungard's secure Parkwest facility. The processes and procedures for SunGard facility entry include a sign in/sign out policy. Unauthorised individuals will not be permitted access to our servers. A visit/call to SunGard can only be authorised by four members of our staff. Our data is stored in this secure facility which means we are able to mitigate against tampering, loss, damage or seizure. We also utalise BitLocker encryption on our database servers so client data is encrypted (256-bit key). We are fully compliant with the Irish data protection act and client data is deleted once it is older than our back-up storage scope. - Bxp_software_in_Sungard also Data_Protection_and_Data_Retention


2.3 Separation between consumers

Separation should exist between different consumers of the service to prevent one malicious or compromised consumer from affecting the service or data of another.


All instances of the service are segregated by client. This means that one client instance of the software is unable to get any data from another client system. As the system is a SaaS Solution users from the same system will have to log in using different usernames / passwords. All events that occur in a user account are stored in log files so it is possible to review all user activity through an audit trail built into bxp. For more information on data segregation view - The_bxp_Infrastructure#Logical_Infrastructure


2.4 Governance framework

The service provider should have a security governance framework that coordinates and directs their overall approach to the management of the service and information within it.


All n One is 80% compliant with ISO 27001 and Cobit 5. All n One currently requires an external audit for validation. Our hosting infrastructure is ISO 27001 complaint which shows that SunGard AS Ireland has developed and implemented a best-in-class information security management system (ISMS) for itself and its customers. For additional information on All n One's certification status view - Security_-_Start_Here


2.5 Operational security

The service provider should have processes and procedures in place to ensure the operational security of the service.


All n One is 80% compliant with ISO 27001 and Cobit 5. All n One currently requires an external audit for validation. Company policies and procedures are stored in a secure internal network. All n One also supplies the public with a company wikipedia that provides information on the service. Our hosting infrastructure is ISO 27001 complaint which shows that SunGard AS Ireland has developed and implemented a best-in-class information security management system (ISMS) for itself and its customers. For additional information on All n One's certification status view - Security_-_Start_Here#Operational_Procedures


2.6 Personnel security

Service provider staff should be subject to personnel security screening and security education for their role.


All colleagues are screened though our HR interview process. All n One strives to provide its colleagues with the safest most enjoyable environment and all HR processes are compliant with the data protection act of Ireland. All colleagues are trained in their field of expertise and are also required to complete a data protection course annually to mitigate against any accidental data loss or data exposure. For more information on our HR and operational processes view - Security_-_Start_Here#Human_Resource_Procedures


2.7 Secure development

Services should be designed and developed to identify and mitigate threats to their security.


All n One complete vulnerability scans on our service and network in order to find issues to mitigate against. This provides us with the high level of security expected from Industry standard. We also have a policy set for development work which can be viewed - How_bxp_is_developed


2.8 Supply chain security

The service provider should ensure that its supply chain satisfactorily supports all of the security principles that the service claims to implement.


For all key bxp operations only All n One staff and SunGard are included. Our software is hosted in a 3rd party data center, provided by SunGard. All other partners are not involved directly in operation or provision of data service. Our other partners include Continuum, NB1 Consult Limited and Sheehan & Associates Accountants for other roles such as sales and marketing.. Additional information can be found here - All_n_One_Partners_and_Suppliers


2.9 Secure consumer management

Consumers should be provided with the tools required to help them securely manage their service.


Clients of the service are told to nominate a security champion for our SaaS Service. This member of staff will be able to use enhanced security features to manage their instance of bxp software (All n One's software). With this the client should be able to manage authentication and separation of access control within the interface. The system champion will also be able to run reports on the actions of users on their instance of bxp through the audit trail functionality.User_Profiling_-_Start_Here . bxp software also provides a means for data protection automation which can be viewed from the following link - Data_Protection_and_Data_Retention We also provide a live security notice board and information resource for our clients to refer to in real time. Bxp_Client_Dashboard_Report


2.10 Identity and authentication

Access to all service interfaces (for consumers and providers) should be constrained to authenticated and authorised individuals.


All n One utilises the latest in TLS technology to provide our clients with the most secure login possible. By utilizing Google's password strength meter API we also have the ability to reject passwords not considered to be "Best" by Google's standards. We also provide the ability to lock down login attempts to only be successful from a particular IP of range of IP's. In order for All n One to manage our hosted servers we have created a secure encrypted VPN connection with SunGard AS. The office in which the operations team work on bxp software development is also fully secured with the latest intevo security system from Kantech which was installed by ADT. - Bxp_-_Ballymount_Security There are a significant number of security configurations possible which are detailed here in our security matrix of options. CC-2-1_Security_and_Custom_Interface_configuration#Matrix


2.11 External interface protection

All external or less trusted interfaces of the service should be identified and have appropriate protections to defend against attacks through them.


All n One complete vulnerability tests on all aspects of the service provided. This is done in order to find vulnerabilities that can then be mitigated against to provide a more secure service. We also provide an API for the software (bxp api) which allows third party systems to interact directly with bxp software. The bxp api will not grant access by default. It requires EXPLICIT IP address declaration to grant any form of access or engage in any communication. Bxp_API


2.12 Secure service administration

The methods used by the service provider’s administrators to manage the operational service should be designed to mitigate any risk of exploitation that could undermine the security of the service.


At All n One we review log files from the service and offer a full audit trail service to our clients for their instances. Bxp_-_Audit_Logs


Our hosting environment SunGard also mitigates against any DDOS or networking attacks through their technical operations centre (TOC). All n One's security department also give consistent security updates to staff and services when available. For more information on our security department view - All_n_One_-_Departments_-_Security


2.13 Audit information provision to consumers

Consumers should be provided with the audit records they need to monitor access to their service and the data held within it.


All n One provides a full audit trail to clients of actions completed on their instance of the service. For additional information on bxp audit logs operation view - Bxp_-_Audit_Logs


2.14 Secure use of the service by the consumer

Consumers have certain responsibilities when using a cloud service in order for it to remain as secure as possible and for their data to be adequately protected.


We provide a set of guidelines to promote the secure using of our service to these users. The following link has the guidelines for bxp usage - You_and_your_bxp


3 Support

All n One provide training for their bxp software to any client who signs up to the service. For this All n One train the client on how to use the system and control the security aspects of the service for their users. The client can also turn on controls as to what a particular user can access so sensitive data could be removed from viewing by a standard colleague.