Laserfiche WebLink
Security and Hosting Overview <br />June 2015 <br />Table of Contents <br />1 INTRODUCTION.......................................................................................................................................4 <br />1.1 SCOPE OF OPERATIONS...................................................................................................................5 <br />1.2 SECURITY MANAGEMENT................................................................................................................6 <br />1.2.1 SECURITY POLICIES, STANDARDS AND PROCEDURES.................................................................................... 6 <br />1.2.2 RISK MANAGEMENT.............................................................................................................................. 6 <br />1.2.3 ASSESSMENTS.......................................................................................................................................7 <br />1.3 APPLICATION SECURITY...................................................................................................................8 <br />1.3.1 ENCRYPTION.........................................................................................................................................8 <br />1.3.2 DATABASE SEGMENTATION.....................................................................................................................8 <br />1.3.3 DOCUMENT ENVELOPES......................................................................................................................... 8 <br />1.3.4 PAGE -LEVEL ACCESS CHECKING...............................................................................................................9 <br />1.3.5 URL ENCRYPTION..................................................................................................................................9 <br />1.3.6 ACTIVITY LOGGING................................................................................................................................9 <br />1.3.7 APPLICATION TESTING............................................................................................................................9 <br />1.3.8 PASSWORD MANAGEMENT................................................................................................................... 10 <br />1.3.9 EMAIL APPROVALS............................................................................................................................... 10 <br />1.3.10 APPLICATION PENETRATION TESTING.................................................................................................... 11 <br />1.4 PHYSICAL SECURITY......................................................................................................................11 <br />1.4.1 INTERNET DATA CENTER CONSTRUCTION................................................................................................ 11 <br />1.4.2 ACCESS CONTROL................................................................................................................................ 11 <br />1.4.3 MAN TRAPS....................................................................................................................................... 12 <br />1.4.4 KEY CONTROL..................................................................................................................................... 12 <br />1.4.5 ALARM SYSTEM................................................................................................................................... 12 <br />1.4.6 CLOSED CIRCUIT TELEVISION SYSTEM...................................................................................................... 12 <br />1.4.7 BACKGROUND CHECKS......................................................................................................................... 12 <br />1.4.8 HOSTING FACILITY SECURITY PERSONNEL................................................................................................ 13 <br />1.5 NETWORK SECURITY.....................................................................................................................13 <br />1.5.1 REDUNDANT COMPONENTS.................................................................................................................. 13 <br />1.5.2 PRIVATE VIRTUAL LANs ....................................................................................................................... 13 <br />1.5.3 FIREWALL...........................................................................................................................................13 <br />1.5.4 24/7 MONITORING.............................................................................................................................14 <br />1.5.5 ENTERPRISE SIEM............................................................................................................................... 14 <br />1.5.6 NETWORK PEN TESTING....................................................................................................................... 14 <br />1.6 DATA MANAGEMENT...................................................................................................................14 <br />1.6.1 DATA BACKUPS AND REPLICATION.......................................................................................................... 14 <br />1.6.2 DATA ARCHIVING................................................................................................................................ 14 <br />1.6.3 DATA DELETION.................................................................................................................................. 15 <br />1.6.4 DATA USAGE...................................................................................................................................... 15 <br />1.6.5 DATA SCRUBBING ................................................................................................................................16 <br />1.6.6 DATA ACCESS..................................................................................................................................... 17 <br />SAP Fieldglass 2 1 21 <br />