epldt Web Builder Security March 2017

Similar documents
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

CS 356 Operating System Security. Fall 2013

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

CogniFit Technical Security Details


PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

DreamFactory Security Guide

CoreMax Consulting s Cyber Security Roadmap

Security Fundamentals for your Privileged Account Security Deployment

Solutions Business Manager Web Application Security Assessment

IBM SmartCloud Notes Security

Magento Commerce Architecture and Security Model Last updated: Aug 2017

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

WEB HOSTING SERVICE OPERATING PROCEDURES AND PROCESSES UNIVERSITY COMPUTER CENTER UNIVERSITY OF THE PHILIPPINES DILIMAN

Cloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

GUIDE. MetaDefender Kiosk Deployment Guide

Penetration Testing following OWASP. Boyan Yanchev Chief Technology Ofcer Peter Dimkov IS Consultant

Locking down a Hitachi ID Suite server

How NOT To Get Hacked

SECURE CODING ESSENTIALS

Total Security Management PCI DSS Compliance Guide

Comprehensive Database Security

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

IBM SmartCloud Engage Security

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

CIS Controls Measures and Metrics for Version 7

Imperva Incapsula Website Security

PCI DSS Compliance. Verba SOLUTION GUIDE. Introduction. Verba and the Payment Card Industry Data Security Standard

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

Payment Card Industry (PCI) Data Security Standard

A (sample) computerized system for publishing the daily currency exchange rates

Information Security Policy

MigrationWiz Security Overview

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

SoftLayer Security and Compliance:

DHIS2 Hosting Proposal

IPM Secure Hardening Guidelines

QuickBooks Online Security White Paper July 2017

Secure Access & SWIFT Customer Security Controls Framework

Cloud FastPath: Highly Secure Data Transfer

Security Architecture

Domain Registrations. Shared Hosting. Office 365 and Hosted Exchange #DOMAINS #HOSTING #

Minfy MS Workloads Use Case

Security. ITM Platform

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

CIS Controls Measures and Metrics for Version 7

Minfy MS Workloads Use Case

California State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines

Overview. Application security - the never-ending story

Cyber Security Requirements for Electronic Safety and Security

ANATOMY OF AN ATTACK!

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Security Solutions. Overview. Business Needs

Version 1/2018. GDPR Processor Security Controls

SECURITY DOCUMENT. 550archi

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

Security Best Practices. For DNN Websites

Application Security through a Hacker s Eyes James Walden Northern Kentucky University

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

Simple and Powerful Security for PCI DSS

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

InterCall Virtual Environments and Webcasting

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

WHITEPAPER. Security overview. podio.com

TIBCO Cloud Integration Security Overview

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management

SECURITY PRACTICES OVERVIEW

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

SDR Guide to Complete the SDR

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

Cyber Criminal Methods & Prevention Techniques. By

SAP Vora - AWS Marketplace Production Edition Reference Guide

Oracle Data Cloud ( ODC ) Inbound Security Policies

How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity

The Common Controls Framework BY ADOBE

University of Colorado

Security Audit What Why

Kishin Fatnani. Founder & Director K-Secure. Workshop : Application Security: Latest Trends by Cert-In, 30 th Jan, 2009

shwedirectory v4.0 Php Web & Business Directory Script Top 12 Features of shwedirectory Premium Edition

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Xerox Audio Documents App

VSP18 Venafi Security Professional

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

VULNERABILITIES IN 2017 CODE ANALYSIS WEB APPLICATION AUTOMATED

Sneak Peak at CIS Critical Security Controls V 7 Release Date: March Presented by Kelli Tarala Principal Consultant Enclave Security

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

the SWIFT Customer Security

Web Application & Web Server Vulnerabilities Assessment Pankaj Sharma

RSA Authentication Manager 8.0 Security Configuration Guide

Implementing security from the inside out in a PeopleSoft environment System hardening with reference to the additional concern for insider threat

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

For Australia January 2018

Transcription:

epldt Web Builder Security March 2017

TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication on access to protected assets and services... 5 Admin application protection... 5 Editor application protection... 5 Spam Prevention protected by CAPTCHA mechanism... 5 Web Service Protection... 6 Protection against web site SQL Injection scenarios... 6 Protection against web site Cross Site Scripting XSS scenarios... 6 Password encryption... 6 File Upload Validation... 6 SSL... 6 Infrastructure and Network security... 7 Security Elements... 7 Cloud Infrastructure Security... 7 Firewall... 7 SSH Private Key protection... 8 Robot attack prevention... 8

Malicious HTTP Requests prevention... 8 Hardening... 8

OVERVIEW epldt Web Builder is a robust platform and the websites populated on the platform are accessed on a daily basis by many thousands of visitors on a daily basis, therefore, system security is a major part of the solution reliability, and is well tested in the real world on a daily basis. epldt Web Builder maintains website data which is edited by site designers and site owners and is being served to the public. epldt Web Builder data does not include sensitive data such as credit card information. The epldt application is deployed on top of the robust and secure cloud infrastructure. This document provides a description of the security elements included in the epldt eclipse product. Chapter 1: Describes the epldt application security elements. Chapter 2: Describes the epldt infrastructure and network security elements.

APPLICATION SECURITY Security Elements The main building blocks of the epldt application security are: User & Role Management The application includes Strict User, Role Management enabling separate authorization rules for users such as Administrators, Site Owners, Web Designers and end users User / Reseller Hierarchy Management The application supports the management of a hierarchy of resellers. This feature allows multiple resellers to work on the same instance without being able to access each other s data. User Authentication on access to protected assets and services The system authenticates users according to the credentials they provide when registering into the system or according to credentials provided by a fulfillment team member. The system requires the user to enter a strong password. Admin application protection The administration Application is accessed over HTTPS. Access to this application can be limited to a specific IP address reducing the risk of intrusion into sensitive administration functionality. Editor application protection The Editor Application is accessed over HTTPS. Spam Prevention protected by CAPTCHA mechanism The application supports online forms which are vulnerable for spamming in order to prevent spamming the system provides both captcha mechanism provisioning and a minimum time limit both used to identify machines trying to post a form.

Web Service Protection The application provides a set of web services for integration with external systems. The Web Services can only be accessed from an approved IP address. Protection against web site SQL Injection scenarios The application prevents users from injecting SQL. The system uses only strong parameter binding and rejects any SQL as input. Protection against web site Cross Site Scripting XSS scenarios The system filters out any attempt to enter dangerous scripts and characters. Password encryption The system encrypts user passwords in the database using a one direction encryption. Passwords can t be restored or recovered. The system allows users to change their password in case it is lost. File Upload Validation Uploaded files are validated against a list of allowed types. The system will not allow users to upload dangerous file types such as server side scripts. SSL The admin and editor web-application are running over HTTPS to ensure encrypt communication between the client and our servers on any administrative and site editing operations.

INFRASTRUCTURE AND NETWORK SECURITY Security Elements The main building blocks of the epldt infrastructure and network security are: Cloud Infrastructure Security The epldt application is deployed on top of the cloud infrastructure. epldt operates the cloud infrastructure that you use to provision a variety of basic computing resources such as processing and storage. The cloud infrastructure includes the facilities, network, and hardware as well as some operational software (e.g., host OS, virtualization software, etc.) that support the provisioning and use of these resources. The cloud infrastructure is designed and managed according to security best practices as well as a variety of security compliance standards. epldt customers can be sure their web solution is built on top of some of the most secure computing infrastructure in the world. The IT infrastructure that Cloud Infrastructure Security provides to its customers is designed and managed in alignment with best security practices and a variety of IT security standards, including: Firewall The application servers are grouped under a security group which is protected by a firewall. The firewall allows access through well-defined ports and protocols. The firewall is setup to allow users access on HTTP port 80 and HTTPS port 443. The firewall is setup to allow administrators access on SSH port 22 on a specific epldt client IP address.

SSH Private Key protection epldt administrators use SSH to manage the application servers on Cloud. SSH access is protected by private key security. This level of security assures that only epldt administrators can access the application servers for maintenance. Robot attack prevention Access and Error logs are regularly scanned for robot attempts. Robots are identified both manually and automatically and unauthorized robot clients IPs are blocked regularly. Malicious HTTP Requests prevention HTTP requests are always checked for well-known malicious URLs. These requests are rejected automatically by the system using pre-defined rewrite rules. Hardening The system components (such as PHP and Apache) are hardened to assure most updated security patches are deployed and unnecessary modules are removed.