Laserfiche WebLink
Security and Hosting Overview <br />June 2015 <br />In order to compromise the security of our email approval feature, a malicious user would <br />need to hack into another user's email account, locate the SAP Fieldglass approval request <br />email, and then submit the approval/rejection response. <br />1.3.10 Application Penetration Testing <br />SAP Fieldglass uses a combination of manual and automated testing to ensure the <br />application is secure. Various automated commercial tools are used prior to each major <br />release of the SAP Fieldglass system (three times per year). <br />On an annual basis, SAP Fieldglass engages a 3rd party security company to conduct pen <br />testing services against our application. This is in addition to SAP Fieldglass' own internal <br />penetration testing efforts. <br />SAP Fieldglass has several test environments available for customers to conduct their own <br />application penetration testing if requested. <br />1.4 Physical Security <br />The SAP Fieldglass data center provides physical security through its secure hosted <br />facilities. The application is hosted within a secure unmarked cage. SAP Fieldglass <br />manages everything from the cage in. Meaning, SAP Fieldglass manages all servers, <br />devices, and software in the cage. The hosting provider provides physical security, <br />internet connectivity, and HVAC. <br />1.4.1 Internet Data Center Construction <br />Exterior perimeter walls, doors and windows are constructed of materials that afford UL <br />Standard #752, Level V Ballistic Protection. <br />1.4.2 Access Control <br />The data center uses an Access Control System (ACS), which supports a networked card <br />reader and alarm system. The ACS uses proximity card readers to control access into <br />perimeter doors, shipping/receiving areas, storerooms and other areas. Biometric hand <br />scanners are installed to control access into the network control center, <br />telecommunications node room and customer vaults. Additional access control measures <br />include: <br />• Designated with signage as controlled access areas <br />• Areas within the internet data center are designated as restricted <br />• Access into the internet data center and restricted areas is controlled by <br />biometric hand scanners, and is limited to authorized personnel <br />• Card access badges or contractor/visitor badges are required to gain entry <br />• All employees, customers, vendors, contractors and visitors must be <br />sponsored by a facilities pre -approved sponsor to gain access <br />• Visitors are escorted at all times within the controlled access area perimeter <br />SAP Fieldglass Page 11 1 21 <br />