Integrated Cloud Environment Security White Paper

Similar documents
Integrated Cloud Environment Evernote User s Guide

Integrated Cloud Environment Concur User s Guide

Integrated Cloud Environment Bates Stamping User s Guide

Awareness Technologies Systems Security. PHONE: (888)

Integrated Cloud Environment User s Guide

Integrated Cloud Environment Scan to PrintCloud User s Guide

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

TECHNICAL INFRASTRUCTURE AND SECURITY PANOPTO ONLINE VIDEO PLATFORM

Integrated Cloud Environment Office 365 User s Guide

Projectplace: A Secure Project Collaboration Solution

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Watson Developer Cloud Security Overview

Integrated Cloud Environment RICOH Content Manager User s Guide

Cisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures

Integrated Cloud Environment Scan to Documentmall User s Guide

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

Data Security and Privacy Principles IBM Cloud Services

Integrated Cloud Environment Scan to Sharepoint User s Guide

QuickBooks Online Security White Paper July 2017

Integrated Cloud Environment Salesforce User s Guide

The Common Controls Framework BY ADOBE

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

Vendor Security Questionnaire

Integrated Cloud Environment Sharefile User s Guide

TRACKVIA SECURITY OVERVIEW

Integrated Cloud Environment Dropbox User s Guide

SECURITY & PRIVACY DOCUMENTATION

Hosted Testing and Grading

System Security Features

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Complete document security

Information Security at Veritext Protecting Your Data

Integrated Cloud Environment Canvas User s Guide

Integrated Cloud Environment Google Drive User s Guide

Keys to a more secure data environment

KantanMT.com. Security & Infra-Structure Overview

Integrated Cloud Environment OneDrive User s Guide

WHITE PAPER- Managed Services Security Practices

ISO27001 Preparing your business with Snare

A company built on security

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Security Information & Policies

IBM SmartCloud Notes Security

The following security and privacy-related audits and certifications are applicable to the Lime Services:

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

System Overview. Security

You Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.

PCI DSS Compliance. White Paper Parallels Remote Application Server

Magento Commerce Architecture and Security Model Last updated: Aug 2017

SECURITY PRACTICES OVERVIEW

Xerox Mobile Print Solution

IC32E - Pre-Instructional Survey

Security Guide SAP Supplier InfoNet

ClearPath OS 2200 System LAN Security Overview. White paper

Infrastructure Security Overview

Xerox Audio Documents App

Online Services Security v2.1

QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES

Cloud FastPath: Highly Secure Data Transfer

WHITE PAPER. Solutions OnDemand Hosting Overview

The Lighthouse Case Management System

Dooblo SurveyToGo: Security Overview

RMS(one) Solutions PROGRESSIVE SECURITY FOR MISSION CRITICAL SOLUTIONS

Support for the HIPAA Security Rule

BLACKLINE PLATFORM INTEGRITY

Web Point and Print White Paper

February 2017 Version: 1.0. Xerox App Gallery 4.0 Information Assurance Disclosure

ZyLAB delivers a SaaS solution through its partner data center provided by Interoute and through Microsoft Azure.

Security Architecture

PHRED Security Information

Layer Security White Paper

Total Security Management PCI DSS Compliance Guide

Security for Streamline NX Secure Print Manager White Paper

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

Pulseway Security White Paper

WORKSHARE SECURITY OVERVIEW

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Security White Paper For GlobalScan NX Version 1.5

Verasys Enterprise Security and IT Guide

WHITEPAPER. Security overview. podio.com

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

Information Security Policy

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Building Cloud Trust. Ioannis Stavrinides. Technical Evangelist MS Cyprus

IPM Secure Hardening Guidelines

AWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards.

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

Cloud-Based Data Security

AppPulse Point of Presence (POP)

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Security+ SY0-501 Study Guide Table of Contents

SECURITY STRATEGY & POLICIES. Understanding How Swift Digital Protects Your Data

Data Security & Operating Environment

Global Platform Hosting Hosting Environment Security White Paper

SoftLayer Security and Compliance:

Transcription:

Integrated Cloud Environment Security White Paper 2012-2016 Ricoh Americas Corporation R i c o h A m e r i c a s C o r p o r a t i o n

R i c o h A m e r i c a s C o r p o r a t i o n

It is the reader's responsibility when discussing the information contained this document to maintain a level of confidentiality that is in the best interest of Ricoh Americas Corporation and its member companies. NO PART OF THIS DOCUMENT MAY BE REPRODUCED IN ANY FASHION AND/OR DISTRIBUTED WITHOUT THE PRIOR PERMISSION OF RICOH AMERICAS CORPORATION. All product names, partner s brands and their products, domain names or product illustrations, including desktop images used in this document are trademarks, registered trademarks or the property of their respective holders and should be noted as such. Any trademark or registered trademark found in this support manual is used in an informational or editorial fashion only and for the benefit of such companies. No such use, or the use of any trade name, or web site is intended to convey endorsement or other affiliation with Ricoh products. Copyright 2012-2013 Ricoh Americas Corporation R i c o h A m e r i c a s C o r p o r a t i o n

Table of Contents Table of Contents... 4 1. Preface... 5 2. Introduction... 7 3. System Overview... 8 Interacting with the applications... 8 Transmitting Information... 8 Understanding and Monitoring Usage... 9 Ensuring Data is Secured... 9 Physical Security... 9 Data and Network Security... 11 Systems Support... 11 Operational and Process Security... 11 Microsoft Azure... 13 Microsoft Azure Data Centers... 13 Microsoft Azure Security and Compliance... 13 R i c o h A m e r i c a s C o r p o r a t i o n Page 4

1. Preface This guide provides the details of Security related information of Integrated Cloud Environment, describing important cloud hosting, data transfer and data backup information. R i c o h A m e r i c a s C o r p o r a t i o n Page 5

This page intentionally left blank to allow for duplex printing. R i c o h A m e r i c a s C o r p o r a t i o n Page 6

2. Introduction What is Integrated Cloud Environment? The Integrated Cloud Environment is a collection of Web applications running within the Ricoh Cloud. An appropriate MFP device, with Browser Unit, is used to access these web applications. These web applications provide various document management services, like Scanning, OCR, Cloud Printing, and connectivity to popular document storage services. R i c o h A m e r i c a s C o r p o r a t i o n Page 7

3. System Overview The Integrated Cloud Environment provides the necessary connectivity to access and utilize the available cloud services. This access is in conjunction with the OCR capability and Cloud Print capability also provided by the Integrated Cloud Environment. The core or basic Integrated Cloud Environment components, including the web application server, OCR server, and the management platform server are hosted within a Microsoft Azure data center. The Print Cloud user application is an exception, and is powered by independently by Soonr Inc (www.soonr.com). This Security White Paper will detail the security management incorporated in the basic Integrated Cloud Environment components. Interacting with the applications In order to ensure that any scanned document is stored or processed only by those authorized, Integrated Cloud Environment provides a User Name and Password authentication screen. This authentication is required whenever you scan your document to an external cloud service. Also once you hit the Home button, you are logged-out from the service, minimizing the risk of an application being used by anyone else. Additionally, if the Home button is not pressed, you are automatically logged-out from the session after 5 minutes. Transmitting Information All sensitive data transferred between the MFP and the Integrated Cloud Environment server, and between the Integrated Cloud Environment server and any external cloud service, is fully encrypted using 128 bit SSL. With the incorporation of encryption in all Integrated Cloud Environment communication, all users can be sure that the information and data being processed remains secure. Only image/icon files used for the user interface of the application are transmitted without encryption. This is done to improve the performance of the user interface rendering with the MFP Browser. R i c o h A m e r i c a s C o r p o r a t i o n Page 8

Understanding and Monitoring Usage The Integrated Cloud Environment is able to monitor the user s scanning and printing activities at the Multi-Function Printer (MFP) to provide audit trail data. The activities which can be tracked are as follows: Scanning from the MFP: Printing from the MFP: 1. Login Failure/Success 1. Download Failure 2. OCR Failure/Success 2. Invalid Release Code 3. OCR File Upload Failure/Success 3. Other Error 4. Scan File Upload Failure/Success 4. Print Success Ensuring Data is Secured The Integrated Cloud Environment servers only store scanning and printing data for a temporary period in order to successfully transfer the data to its specified destination or to be downloaded to the MFP. The MFP local data is purged immediately after the transfer is complete. All customer data used to manage their Integrated Cloud Environment license/accounts, such as: customer name, email address and admin name, is securely maintained and backed-up as detailed below. Physical Security The Integrated Cloud Environment is hosted at a secure Microsoft Azure data center located in Des Moines, Iowa (Azure designation: Central US). The data center provides unsurpassed security, and availability (up-time) for the application. The data center s security features include: Purpose-built data center with numerous prevention and detection technologies integrated into its architecture, including 24-hour security monitoring and control. Azure data centers are designed to the standards established by the National Fire Protection Association (NFPA). Specifically: o NFPA 75, Standard for the Protection of Information Technology (IT) Information Equipment, and o NFPA 76, Standard for the Fire Protection of Telecommunications Facilities These standards include specific requirements for data center construction, fire protection and detection systems, including gaseous, water mist and clean agent fire protection systems Proximity protection provided by 24-hour security guards, video surveillance, access controlled with biometric identification controls and mantrap corridors. R i c o h A m e r i c a s C o r p o r a t i o n Page 9

Environmental Control cooling systems with monitored temperature humidity controls designed with n+1 reliability. R i c o h A m e r i c a s C o r p o r a t i o n Page 10

Data and Network Security To protect against loss, corruption, or unauthorized access, the Integrated Cloud Environment s systems and procedures are designed and maintained for maximum security of all customer data. Among the security aspects of the Integrated Cloud Environment production systems and network are: Network perimeter defenses to prevent unauthorized access to the system and internal network, including firewalls and intrusion detection/prevention systems with 24-hour monitoring and event logging to identify and respond to potential threats. Multi-tiered system architecture to limit access and vulnerabilities due to security breaches. Compute Resource redundancy: all Azure virtual machines (VMs) are protected from failure by maintaining 3 redundant instances at all times. This prevents data loss Storage redundancy: data in Azure storage accounts are replicated to ensure durability and high availability. The ICE solution utilizes Locally-redundant storage (LRS). Every request made in the storage account is replicated three times. These three replicas each reside in separate fault domains and upgrade domains Hardened operating system on all production machines with regular security patching and vulnerability scanning. Virus protection to prevent malicious data corruption. Systems Support Integrated Cloud Environment system support is provided by a seasoned team of system and networking professionals certified in all key components of the physical production systems and Integrated Cloud Environment application. System personnel are available 24 hours a day, 7 days a week to ensure that the system remains accessible at all times. Real-Time systems monitoring is implemented to immediately notify the support staff should a problem occur. Scheduled routine maintenance is performed to ensure the application is running optimally, and incorporates the latest software updates and upgrades including up-to-date protective measures, such as virus protection. All Integrated Cloud Environment systems are fully redundant to minimize the chance data of loss or corruption. Operational and Process Security To ensure maximum security in all phases of the Integrated Cloud Environment s development and support, Ricoh Americas Corporation incorporates a formalized set of Information Security Management System (ISMS) policies, and is ISO 27001 compliant. Developed by the International Organization for Standardization (ISO), ISO 27001 ensures that the guidelines and general principles for initiating, implementing, maintaining, and improving information security R i c o h A m e r i c a s C o r p o r a t i o n Page 11

management within an organization are maintained. To ensure compliance with defined procedures, regular audits are conducted. R i c o h A m e r i c a s C o r p o r a t i o n Page 12

Microsoft Azure Microsoft Azure is a flexible, open, and secure public cloud built for business. Azure includes a broad collection of integrated services that accommodate many languages and operating systems. Services include: Compute Data Management Networking Developer Services Identity and Access Mobile Back-up Messaging and Integration Compute Assistance Performance Big Data and Big Compute Media Commerce Microsoft Azure Data Centers Microsoft Corp. delivers more than 200 cloud services including the Microsoft Azure platform. These services are hosted in Microsoft s cloud infrastructure composed of more than 100 globally distributed datacenters, edge computing nodes, and service operations centers. This infrastructure is supported by one of the world s largest multi-terabit global networks, with an extensive dark fiber footprint, that connects them all. For more information visit www.microsoft.com/datacenters Microsoft Azure Security and Compliance Microsoft Azure has been developed to meet stringent security, privacy, transparency and compliance requirements. The Microsoft Azure infrastructure conforms to numerous certifications including ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2, ISO/IEC 27018. For a full list see https://www.microsoft.com/en-us/trustcenter/compliance/default.aspx" R i c o h A m e r i c a s C o r p o r a t i o n Page 13