Laserfiche WebLink
SOLICITATION # CH16012 <br />mechanisms to achieve confidentiality and integrity protections, as appropriate." All secondary <br />storage media (hard drives, disk drives, and tapes) containing customer data are maintained <br />within Salesforce's secure production data centers until the media has been sanitized and <br />destroyed. Salesforce relies on physical access controls as a compensating control to protect the <br />data. <br />For primary data storage, Salesforce provides customers with a built-in capability to apply field - <br />level encryption, using 128-bit keys with AES encryption, for a selection of custom fields included <br />in the Force.com Platform and Salesforce Services. Field -level encryption ensures the data <br />associated with designated fields is encrypted in storage. <br />SAP <br />Ariba <br />Sensitive data elements, including PCI Primary Account Numbers and system <br />account parameters for internal application communications, are stored in <br />Ariba databases encrypted by the AES (Advanced Encryption Standard) and <br />Triple DES (Data Encryption Standard) encryption algorithms with a minimum <br />key length of 128 bits. Encryption technology is also applied for the client <br />connection to the Web site and to the hosted application passwords in <br />storage. Customer user passwords are one way hashed using SHA256 and <br />salted with random data. Limited Ariba Operations personnel have data query <br />access and monitoring rights for the Ariba Hosting program. <br />Field lass <br />Hanna <br />SAP provides for enterprise -grade and industry -standard security. SAP HANA <br />Enterprise Cloud datacenters are enterprise -class security with enterprise - <br />class protection including data encryption, network encryption, firewalling, <br />network isolation, and intrusion detection. HANA data is protected in multiple <br />different ways. SAP HANA Enterprise Cloud is a managed cloud service that <br />employs either a VPN or MPLS connection for transit. By default VPN is <br />encrypted and MPLS can be encrypted. The customer procures the method of <br />connection. At installation, HANA data can be encrypted using a feature called <br />Data Volume Encryption. This encryption protects data in the persistence <br />layer. Storage volume access is restricted to the customer account that <br />created the volume, thus denying all other customer accounts the permission <br />to view or access the volume that includes data isolation, masking, zoning and <br />Logical Unit (LUN) binding. Strict user and access management, authorization <br />management according to the need -to -know principle for administrative <br />accounts, and security logging and security monitoring for critical activities or <br />access, also protect data stored in HANA. <br />Hybris <br />The Hybris platform uses SSL (https) for both the web application tier <br />(browsers and WebService APIs) as well as communicating with back office <br />systems. <br />Data at rest is something that has to be taken into consideration in the <br />application requirements by the partner/customer or PS teams. If encryption is <br />required the application teams need to work on implementing the methods to <br />encrypt and secure the data, for example encrypting data fields in the <br />database. <br />SuccessFactors <br />Each customer's data is maintained in a separate database schema <br />eliminating data segmentation breaches. Each schema has separate <br />authentication credentials and assigned resource profile to restrict access <br />rights and resource consumption. Encryption for data at rest uses the AES256 <br />cipher. All application access is encrypted -in -transit over HTTPS with 128-bit <br />TLS encryption. <br />carahsoft 95 carahsoft <br />