This paper introduces the security policies, practices, and procedures of Lucidchart.

Similar documents
Security and Compliance at Mavenlink

Information Security Policy

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Cloud FastPath: Highly Secure Data Transfer

The Nasuni Security Model

Projectplace: A Secure Project Collaboration Solution

Layer Security White Paper

Security Guide Zoom Video Communications Inc.

Security Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication

TIBCO Cloud Integration Security Overview

AWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards.

Awareness Technologies Systems Security. PHONE: (888)

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

InterCall Virtual Environments and Webcasting

PCI DSS Compliance. White Paper Parallels Remote Application Server

SignalFx Platform: Security and Compliance MARZENA FULLER. Chief Security Officer

Twilio cloud communications SECURITY

Watson Developer Cloud Security Overview

PCI DSS and VNC Connect

Google Cloud Platform: Customer Responsibility Matrix. December 2018

QuickBooks Online Security White Paper July 2017

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL INFRASTRUCTURE AND SECURITY PANOPTO ONLINE VIDEO PLATFORM

Google Cloud Platform: Customer Responsibility Matrix. April 2017

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

This paper introduces the security policies, practices, and procedures in place at Smartsheet.

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER

Cloud Security Best Practices

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

Security & Compliance in the AWS Cloud. Amazon Web Services

Trello Business Class

Overview of AWS Security - Database Services

SECURITY PRACTICES OVERVIEW

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Data Center Operations Guide

PCI DSS and the VNC SDK

MYOB Advanced SaaS. Why choose MYOB Advanced? Fact Sheet. What is MYOB Advanced SaaS?

Adobe Sign and 21 CFR Part 11

Security Specification

Cloud Security Whitepaper

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

SECURITY & PRIVACY DOCUMENTATION

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Security Overview of the BGI Online Platform

APPLICATION & INFRASTRUCTURE SECURITY CONTROLS

CPM. Quick Start Guide V2.4.0

WHITEPAPER. Security overview. podio.com

Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations

CogniFit Technical Security Details

Secure Industrial Automation Remote Access Connectivity. Using ewon and Talk2M Pro solutions

Echidna Concepts Guide

Google Identity Services for work

HySecure Quick Start Guide. HySecure 5.0

Security in Bomgar Remote Support

SAP Security in a Hybrid World. Kiran Kola

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Accelerating the HCLS Industry Through Cloud Computing

Five Reasons It s Time For Secure Single Sign-On

A company built on security

8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Title: Planning AWS Platform Security Assessment?

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

What can the OnBase Cloud do for you? lbmctech.com

Technical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH

Evolved Backup and Recovery for the Enterprise

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

BeBanjo Infrastructure and Security Overview

Deep Freeze Cloud. Architecture and Security Overview

Cyber Security Hardening Guide

Cloud Computing /AWS Course Content

Security in the Privileged Remote Access Appliance

Simple Security for Startups. Mark Bate, AWS Solutions Architect

zsah Cloud Offering Security FAQ In partnership with Clearswift

For USA & Europe January 2018

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Cisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures

IPM Secure Hardening Guidelines

Liferay Security Features Overview. How Liferay Approaches Security

Security and Privacy Overview

Verasys Enterprise Security and IT Guide

Product Brief. Circles of Trust.

SECURE DATA EXCHANGE

For Australia January 2018

Data Security and Privacy Principles IBM Cloud Services

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

The Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved.

AWS Security. Stephen E. Schmidt, Directeur de la Sécurité

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content

Intermedia s Private Cloud Exchange

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

SECURITY STRATEGY & POLICIES. Understanding How Swift Digital Protects Your Data

The Common Controls Framework BY ADOBE

MigrationWiz Security Overview

Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Transcription:

Lucidchart Security Abstract This paper introduces the security policies, practices, and procedures of Lucidchart. The paper lays out the architecture security of this software-as-a-service product. It explains the application level content controls available to end users and account administrators. The paper discusses the internal controls and external reviews covering both application development and live site operations. Finally, it discusses the information security surrounding integrations with Lucidchart partners. The reader will gain an understanding of how Lucidchart employees, service providers, and partners safeguard customer data. March 2013 Copyright Notice: All materials are copyright, 2013 by Lucid Software, Inc. 1

Contents Executive Summary Consumerization of IT About Lucidchart Secure Architecture, Controls, and Partners Architecture Secure infrastructure Data encryption Network protection Availability Disaster recovery Content Controls Application Authentication Authorization Data ownership Internal Controls Operations Internal reviews External reviews Partners Single sign-on On-premise applications Cloud-based applications Visio viewers Conclusion Contact us 2

Executive Summary Consumerization of IT A pair of recent studies found that 37% of companies are using cloud infrastructure for business critical applications 1 and that 70% of companies already using these services plan to move additional applications to the cloud in the next 12 months 2. Employees are also driving Bring- Your-Own-App (BYOA) and Bring-Your-Own-Device (BYOD) movements at many organizations. A study of consumer devices in the enterprise found that 40% of the devices used to access business applications were personally owned 3. The adoption of cloud services, mobile devices, and social tools for business use is happening at various levels of the enterprise as well. 69% of employees report using smart mobile devices for business purposes 4, including 86% of CEOs under age 40 5. This consumerization of the enterprise challenges CIOs, CTOs, and other IT professionals in designing and implementing policies and procedures to meet the demands of their organizations. Cloud services relieve IT professionals of the burden of installing and operating applications. The shared responsibility between IT and the service provider also brings new challenges. The most commonly reported barriers to adopting cloud services and new devices in the enterprise are security and compliance 67. This paper provides an overview of Lucidchart s approach to security so enterprises can understand how Lucidchart fits with their own policies, procedures, and controls. About Lucidchart Lucidchart is a leading collaborative online diagramming application provided by Lucid Software, Inc. It is delivered through a software-as-a-service model that avoids up front costs and IT operational burden. It is designed to be accessible anywhere, anytime, and from any device. It provides an intuitive interface for building flow charts, mind maps, org charts, architecture diagrams, and more. 1 http://venturebeat.com/2011/05/31/survey-shows-37-percent-of-companies-using-the-cloud/ 2 http://www.mimecast.com/about-us/press-centre/press-releases/dates/2010/2/70-percent-of- companies-using-cloud-based-services-plan-to-move-additional-applications-to-the-cloud-in-the-next-12- months/ 3 http://www.csoonline.com/article/686087/consumer-device-use-is-growing-but-it-and-security-can-tkeep-up?page=1 4 http://www.csoonline.com/article/686087/consumer-device-use-is-growing-but-it-and-security-can-tkeep-up?page=1 5 http://www.ceo.com/wp-content/uploads/2011/12/futuresocialceo.png 6 http://www.csoonline.com/article/686087/consumer-device-use-is-growing-but-it-and-security-can-tkeep-up?page=1 7 http://www.cloudpassage.com/press-releases/2012-12-12-cloud-study.html 3

Lucidchart integrates with multiple single sign-on providers, Google Apps, Google Drive, Box.com, Confluence, Jira, Jive, and many other popular business tools. It is also the only webbased application that supports the import and export of Microsoft Visio documents to enable a smooth transition between Visio and the cloud. The power, simplicity, affordability, and security of Lucidchart have driven its adoption by hundreds of thousands of users across thousands of small and medium sized businesses, educational institutions, and teams within large enterprises. Secure Architecture, Controls, and Partners Lucidchart delivers secure diagramming through a secure application architecture, a system of internal controls, and a set of policies governing partnerships and integrations. Lucidchart provides security across many dimensions including data secrecy, authentication, authorization, and auditing. Our unique architecture ensures that our customers' names, emails, documents, images, and other intellectual property are available and protected at all times. Industry-standard encryption, multiple physically separate data centers, and a brilliant set of engineers make Lucidchart the de facto charting application for corporations and individuals worldwide. -Matthew Barlocker, Chief Architect, Lucid Software, Inc. Architecture Secure infrastructure Lucidchart is powered by Amazon Web Services (AWS), the industry s leading provider of secure computing infrastructure. AWS meets stringent security measures 8 that include a variety of physical controls to the data centers, data privacy guarantees, and robust controls to its services. AWS has published whitepapers on Risk and Compliance 9 and Security Processes 10. AWS has achieved the following certifications and third-party attestations: SAS70 Type II audits Level 1 service provider under the Payment Card Industry (PCI) Data Security Standard (DSS) ISO 27001 certification U.S. General Services Administration FISMA-Moderate level operation authorization 8 https://aws.amazon.com/security/ 9 http://media.amazonwebservices.com/aws_risk_and_compliance_whitepaper.pdf 10 http://media.amazonwebservices.com/pdf/aws_security_whitepaper.pdf 4

To learn more about the security procedures employed by AWS, please review their documentation 11. Data encryption Lucid Software understands the sensitivity of private business documents, communication, and personally identifiable information. To ensure the privacy of this information, all data is transferred between user devices and Lucidchart servers using a 256-bit encrypted connection via TLS 1.1 and a world-class certificate provider. Lucidchart also employs encryption at rest to protect the secrecy of all data persisted by the application. All databases, database-backed caches, and other components with persisted data have their disks initialized with random data using a high-entropy, random data source. During use, the disks encrypt their contents with 256-bit AES with ESSIV. The cryptographic keys are protected by a pair of (redundant) passphrases stored in separate environments. Network protection Lucidchart runs in an AWS Virtual Private Cloud (VPC) that is not accessible from the public internet. All traffic to and from the public internet must travel through specific gateways. The Lucid Software operations team uses secure connections for working on VPC machines. Network access to the environment happens through an OpenVPN server that is locked down to a strict set of clients. SSH connections to the VPC servers use Diffie-Hellman 1024 for key exchange and encrypt the entire session with industry-standard Blowfish cipher and 1024-bit unique keys. Keys are generated per user and can be shut off individually upon termination. To provide rigorous access control, the various services and service tiers are segregated by network layer (IP) and transport layer (TCP & UDP) firewalls. The firewalls are implemented by AWS Security Groups and limit all inbound network connection attempts, except with strict sets of client machines for each service. See Figure 1 below. 11 https://aws.amazon.com/security/ 5

Figure 1 - Firewalls between Application Tiers 6

Availability An integral part of the Lucidchart service is the ability to securely access the tool from anywhere, from any device, and at any time. Lucidchart is architected from the ground up to be highly available. Documents, account information, access control lists, and other persistent data is replicated across availability zones using industry standard database management systems, replication, and failover solutions. All services are clustered and served through AWS Elastic Load Balancers (ELBs), giving users access to their documents whenever needed. One of the benefits to software-as-a-service is that users always get the latest version of the software at no cost and without any work by IT. That is true for Lucidchart, and our biweekly upgrades are done with no downtime. This means users will never receive a down for scheduled maintenance page when finalizing critical documents for a meeting or deadline. Because some components do fail, the Lucid Software operations team maintains a robust automated live site monitoring system and a 24/7 on-call rotation to ensure that the redundancy, failover, and self-healing mechanisms work properly at all times. We quantify our reliability by offering a 99.9% uptime guarantee to enterprise customers. This guarantee ensures the availability of our services 24 hours a day, 7 days a week, 365 days a year. Disaster recovery Closely related to uptime is disaster recovery. Customer documents and related data are backed up hourly to multiple physical environments across availability zones in encrypted format. The Lucid Software operations team performs regular validations of these snapshots to ensure that they can be used for restoration in the event of an emergency. Content Controls Application Authentication Lucidchart gives team administrators the flexibility to set the password policy for their account. They can set the required password length, required character classes, and frequency of password changes. Admins may also manually force all team members to reset their passwords. Passwords are never transmitted in plain text. 7

Only salted one-way hashes of passwords are ever stored by Lucidchart servers, and never the passwords themselves. Individual user identity is authenticated and re-verified with each transaction, using a secure token created at login. Authorization We follow security best practices by using least privilege access principles to protect your data. A simple role-based permissions system is available to Lucidchart user administrators. There are two primary sets of access controls: account controls and document controls. In relation to account management, there are 3 roles: account admin, team admin, and user. Table 1 lists the features that each role may access. Permission Account admin Team admin User List team members Manage group membership Manage account users Set (not view) user passwords Manage team settings Manage integrations with other apps Manage team admins Manage subscription level Manage payments Table 1 - Account Management Permissions The account management tools allow account and team admins to both remove users from their account, as well as delete users that are part of their account. In the latter case, the admin has the option to take ownership of any documents that the deleted user owns. Admins may enable or disable the following features through the team settings page: Sharing of diagrams on social networks 8

Publishing of diagrams as web pages, exportable documents, and images Generation of public links to diagrams Restriction of sharing to users with email addresses under certain domains. In relation to Lucidchart documents, there are 3 roles: owner, editor, and viewer. The creator of the document always has the role of owner. Documents are private by default (no other user has any level of access to the document). Table 2 lists the features that each role may access. Permission Owner Editor Viewer View document Edit document Comment on document Delete document Share document Table 2 - Document Permissions Data ownership Lucidchart claims no ownership over any documents created through our services. Users retain copyright and any other rights, including all intellectual property rights, on created documents and all included content. We respect your privacy and will never make your documents or other information publicly available without permission. Internal Controls Lucid Software uses a multi-dimensional control framework to ensure security is maintained and continually improved. Company leaders support security and provide a positive control environment. Risk assessment is performed by both internal and external system reviews. Security information and objectives are openly shared among team members. Security measures are continually monitored and improved. Operations Administrative access to the production environment of Lucidchart is controlled. Only authorized members of the Lucid Software operations team have access to the AWS console that manages the environment. Least privilege access is designed so team members with legitimate need to access components like production logs may do so without administrative access to critical processes and secure drives. 9

Internal reviews Security reviews are performed at multiple stages in the development process. All critical architecture designs are reviewed by several Lucid Software team members, including the CTO, Chief Architect, VP of Engineering, and others. Code reviews of implemented designs include security reviews. The reviews verify the secrecy, authentication, authorization, and other security needs of each feature or component. External reviews Lucid Software hires a third party to perform penetration testing. These security professionals analyze Lucidchart for OWASP top-10 threats and all 26 WASC threat classes. These analyses are performed quarterly using industry-leading automated tools and extensive manual testing. Partners Many users are attracted to Lucidchart because of its easy integration with a variety of popular business applications. These include on-premise applications like local Confluence instances and Microsoft Word, as well as many cloud-based services like Google Drive and Confluence OnDemand. These integrations can be managed by account and team admins. Single sign-on Lucidchart supports single sign on using the popular OpenId 12 technology. The OpenId providers supported are Google and Yahoo. On-premise applications Lucidchart s Microsoft Word integration uses a sandboxed browser built into Word. The browser opens up a version of the Lucidchart site on the lucidchart.com domain. Because the integration happens through the browser, the user can access their diagrams using their standard username and password, and does so without sharing those credentials with Word. Admins for on-premise Confluence instances have the option to add the Lucidchart plugin if desired. It is configured using an OAuth key and secret that are unique to that team, and which only team and account admins can access on lucidchart.com. Confluence users then insert Lucidchart diagrams using industry standard OAuth. Cloud-based applications Lucidchart integrates with Confluence OnDemand, Google Apps, Google Drive, and Jive using OAuth 13. Because these applications use OAuth, user passwords are never entered into or stored by a third-party application. The integrations require very little configuration by the admin. 12 http://openid.net/ 13 http://oauth.net/ 10

Visio viewers Lucidchart supports the viewing of Microsoft Visio files on the web through its Visio API. Lucidchart plugins in Box.com and on-premise Confluence instances enable users of those apps to view Visio files. Users use the viewer by manually selecting a single Visio file to view in Lucidchart. The single file is sent over a secure HTTPS connection (see Data encryption section) to the Lucidchart servers, and the plugin receives an HTTPS url to a web page that allows the user to privately view the diagram. The web page is secured by a time-limited, secure token known only to that client. The Visio files are not stored permanently by Lucidchart unless the user manually selects to import it into their Lucidchart account after viewing it. If the user does import the file, it is protected by all of the standard authentication and authorization mechanisms described above. Conclusion Lucidchart provides secure diagramming to business users through a secure architecture, effective administrative tools, and a selection of partners respected by enterprises for their security. The reader has learned how the architecture implements secrecy through encrypted transmissions and storage of data. That data is made highly available and reliable through modern replication, backup, failover, and monitoring techniques. Authentication and authorization are foundational features of the service with administrative controls to tune the system to meet different corporate guidelines and policies. Lucid Software follows information systems best practices of internal controls and external reviews. Finally, in the easy integrations with several popular business tools, Lucidchart applies the same security standards as it does to its main service. Contact us Contact Lucidchart sales at sales@lucidchart.com or 408-475-6427 to discuss Lucidchart service options. 11