Verasys Enterprise Security and IT Guide

Similar documents
How do you decide what s best for you?

Layer Security White Paper

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Microsoft Azure Security, Privacy, & Compliance

Digital Health Cyber Security Centre

Riverbed Xirrus Cloud Processes and Data Privacy June 19, 2018

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Security Architecture

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

LBI Public Information. Please consider the impact to the environment before printing this.

SoftLayer Security and Compliance:

NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director

Security and Compliance at Mavenlink

Security Principles for Stratos. Part no. 667/UE/31701/004

Security Operations & Analytics Services

WHITEPAPER. Security overview. podio.com

Pulseway Security White Paper

No Country for Old Security Compliance in the Cloud. Joel Sloss, CDSA Board of Directors May 2017

TRACKVIA SECURITY OVERVIEW

Twilio cloud communications SECURITY

Google Cloud & the General Data Protection Regulation (GDPR)

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201

Internal Audit Report DATA CENTER LOGICAL SECURITY

Amit Panchal Enterprise Technology Strategist

Cyber Defense Operations Center

SECURITY & PRIVACY DOCUMENTATION

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

CoreMax Consulting s Cyber Security Roadmap

Security & Compliance in the AWS Cloud. Amazon Web Services

Watson Developer Cloud Security Overview

Awareness Technologies Systems Security. PHONE: (888)

Xerox Audio Documents App

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

Targeted Attacks. Identitycentric. Compliance. Cloud BYOD

Today s top THREAT ACTORS pose unique challenges

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

QuickBooks Online Security White Paper July 2017

Protecting Your Cloud

Google Cloud s Approach to Security

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

A10 HARMONY CONTROLLER

Education Network Security

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

DreamFactory Security Guide

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

What is Office 365? Experience Office virtually anywhere.

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Introduction to AWS GoldBase

Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance. April 2015

Integrated Cloud Environment Security White Paper

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

The Nasuni Security Model

HIPAA Regulatory Compliance

WORKSHARE SECURITY OVERVIEW

Security and Privacy Overview

AWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards.

Building Cloud Trust. Ioannis Stavrinides. Technical Evangelist MS Cyprus

Best Practices in Securing a Multicloud World

APPLICATION & INFRASTRUCTURE SECURITY CONTROLS

Securing Office 365 with MobileIron

SECURITY PRACTICES OVERVIEW

Information Security at Veritext Protecting Your Data

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Online Services Security v2.1

Technical Brief. A Checklist for Every API Call. Managing the Complete API Lifecycle

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

The Common Controls Framework BY ADOBE

Protecting your data. EY s approach to data privacy and information security

zsah Cloud Offering Security FAQ In partnership with Clearswift

En partenariat avec CA Technologies. Genève, Hôtel Warwick,

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

Agenda. Future Sessions: Azure VMs, Backup/DR Strategies, Azure Networking, Storage, How to move

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Information Security Controls Policy

ngenius Products in a GDPR Compliant Environment

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

Real4Test. Real IT Certification Exam Study materials/braindumps

AWS Storage Gateway. Amazon S3. Amazon EFS. Amazon Glacier. Amazon EBS. Amazon EC2 Instance. storage. File Block Object. Hybrid integrated.

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Security in Cloud Environments

Security

Hybrid Data Security Overview

MEETING ISO STANDARDS

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

the SWIFT Customer Security

Office 365 Security. White Paper

SIEMLESS THREAT DETECTION FOR AWS

Secure Access - Update

System Security Features

February 2017 Version: 1.0. Xerox App Gallery 4.0 Information Assurance Disclosure

CYBER SECURITY WHITEPAPER

Data Processing Amendment to Google Apps Enterprise Agreement

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Centrify Identity Platform Trust and Security

WHITE PAPER- Managed Services Security Practices

Cloud Customer Architecture for Securing Workloads on Cloud Services

Data Security and Privacy at Handshake

Transcription:

Verasys Enterprise Johnson Controls Milwaukee WI, USA www.verasyscontrols.com LIT-12013026 March 2018

Contents Introduction... 3 Microsoft Azure security and privacy... 5 Security... 5 Privacy...5 Compliance...5 Data Platform authentication... 7 IMS authorization and API access... 7 Verasys Enterprise logging and monitoring...8 Application logging... 8 Server monitoring...8

3 Introduction This document is intended for building automation system (BAS) and IT professionals. Engage appropriate network security professionals to ensure that the computer that hosts the Site Director is a secure host for Internet access. Network security is an important issue. Typically, your IT organization must approve configurations that expose networks to the Internet. Be sure to read and understand IT Compliance documentation for your site. Verasys Enterprise automatically inherits your Verasys infrastructure from Smart Building Hubs. You can use Verasys Enterprise to monitor and control multiple Smart Building Hubs across your portfolio. 1: Verasys architecture diagram 2: Verasys Enterprise architecture diagram Verasys Enterprise interacts with the Identity Management Service (IMS) over https. After successful authentication, Verasys Enterprise receives a token from the IMS and interacts with the Data Platform REST APIs over https. The SBH communicates with Verasys Enterprise in OData JSON and the user communicates with Verasys Enterprise with the https protocol. The Microsoft Azure cloud storage platform consists of the following components: IOT Hub Verasys Enterprise collects data with Azure IOT Hub and stores data in the Azure Document DB. IOT Hub includes the following functionality: Provides reliable device-to-cloud and cloud-to-device messaging at scale. Enables secure communications with per-device security credentials and access control.

4 Provides extensive monitoring for device connectivity and device identity management events. Includes device libraries for the most popular languages and platforms. Web Jobs Web Jobs runs programs or scripts in the App Service web app continuously, on demand, or on a schedule. Event Hub Event Hub is an event processing service that provides event and telemetry ingress to the cloud at massive scale, with low latency and high reliability. Document DB Document DB is a NoSQL document database service that supports JSON directly inside the database engine. Data Platform APIs The Verasys SBH interacts with Verasys Enteprirse with the Platform APIs. The Data Platform is a collection of services that collect and serve building objects and time series data. The Data Platform serves multiple applications. 3: Data Platform API architecture

5 Microsoft Azure security and privacy Microsoft makes security and privacy a priority at every step, from code development up to incident response. Security and privacy are built into the Azure platform. The Security Development Lifecycle (SDL) addresses security at every development phase, from initial planning to launch. Microsoft update Azure continually to make it even more secure. Operational Security Assurance (OSA) is an additional framework that ensures secure operations throughout the lifecycle of the cloud-based service. Azure is the only public cloud platform to offer continuous security-health monitoring. For more information about Microsoft Azure security and privacy, read this document and see the Microsoft Azure Onboarding Guide Security Microsoft employs rigorous security and technology practices to ensure that Azure is resilient to attack, safeguards user access to the Azure environment, and keeps customer data secure. Encrypting communications and operation processes: For data in transit, Azure uses industry-standard transport protocols between user devices and Microsoft datacenters, and within datacenters themselves. For data at rest, Azure has a wide range of encryption capabilities up to AES-256. Securing networks: Azure has the infrastructure necessary to securely connect virtual machines to one another and to connect on-premises datacenters with Azure VMs. Azure blocks unauthorized traffic to and within Microsoft datacenters with a variety of technologies. Azure Virtual Network extends your on-premises network to the cloud with site-to-site VPN. Managing threats: To protect against online threats, Azure uses Microsoft Anti-Malware for cloud services and virtual machines. Microsoft also employs intrusion detection, denial-of-service (DDoS) attack prevention, regular penetration testing, data analytics and machine learning tools to mitigate threats to the Azure platform. Privacy Microsoft adheres to the the world s first code of practice for cloud privacy, ISO/IEC 27018. With Azure, customers own customer data - that is, all data, including text, sound, video or image files and software, that customers supply to Microsoft with Azure. Customers can access their data at any time and for any reason without assistance from Microsoft. Microsoft does not use customer data or derive information from it for advertising or data mining. Compliance Azure conforms to a broad set of international and industry-specific compliance standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1, and SOC 2, as well as country-specific standards like Australia IRAP, UK G-Cloud and Singapore MTCS. Rigorous third-party audits, such as by the British Standards Institute, verify Azure s adherence to the strict security controls that these standards mandate. As part of Microsoft's commitment to trans-

6 parency, you can request audit results from these third parties to verify successful implementation of security controls.

7 Data Platform authentication All authentication to the Data Platform occurs with the Identity Management Service (IMS) API. The IMS API uses Identity Server 3. Use the following list to understand typical interactions: Browsers communicate with web applications. Web applications communicate with web APIs autonomously or on behalf of a user. Browser-based applications communicate with web APIs. Native applications communicate with web APIs. Server-based applications communicate with web APIs. Web APIs communicate with web APIs autonomously or on behalf of a user. The IMS handles all fundamental security functions. IMS authorization and API access Verasys Enterprise uses OAuth2 to authorize user access. OAuth2 is a protocol that applications can use to request access tokens from a security token service and then use the tokens to communicate with APIs. This practice reduces complexity on the client application as well as the API, since authentication and authorization are centralized. The OAuth2 specification defines several authorization grants that can be used to coordinate authentication of a user and grant access to resources that the user owns.

8 Verasys Enterprise logging and monitoring Verasys Enteprise creates log files to record issues that may occur. Johnson Controls staff monitor these log files and Verasys Enterprise servers. Application logging Application log information is available within the application user interface for administrators to monitor critical activity. Verasys Enterprise conducts additional application logging of the user interface for troubleshooting purposes. The Johnson Controls Data Center Operations team monitors logs for critical events. Server monitoring The Johnson Controls Development Operations team uses IT Brain to monitor server availability and performance. Verasys Enterprise sends an automated alert to the team if there is any issue on the server.