Skip to content

Latest commit

 

History

History
552 lines (278 loc) · 39 KB

summary.md

File metadata and controls

552 lines (278 loc) · 39 KB

Summary and Guidance

Security Program Overview

  • Information Security Program and Scope

    This describes the organization's information security program scope and high level program management processes.

  • Understanding the Policies and Documents

    This describes how information security policies are structured.

  • Metrics and Reporting

    This describes the key metrics and high level reporting process for the information security management program.

Security Architecture and Operating Model

  • Security Principles

    This describes the high level operating principles of a DevOps oriented security program. The cloud-native, zero-trust approach enables a modern security operating model and eliminates the need for certain legacy security controls.

  • Security Architecture

    A good security architecture is the starting point of a strong program foundation. You will need to maintain an up to date architecture diagram for security reviews with customers and auditors. JupiterOne can help automate the generation of network and application architecture diagrams in your cloud environments, so you don't have to spend time maintaining and updating it every time something changes.

  • Metrics and Reporting

    You will need to define a set of KPIs and metrics for monitoring and reporting on the effectiveness of the security controls. You can leverage JupiterOne's querying/reporting capability to automate the reporting process.

Roles, Responsibilities and Training

  • Assignment of Roles and the Security Committee

    Regulatory compliance frameworks, such as HIPAA, require formal assignment of security and privacy responsibilities to someone in your organization. As your organization expands and matures, you may want to form an executive level security committee to meet this requirement. Often, such a committee is a requirement of security certifications such as HITRUST CSF. You can manage this role assignment manually (I.E. in this documented policy/control procedure) or in the JupiterOne's app. Using JupiterOne, you can almost always avoid implementing a complicated enterprise GRC system.

  • Policy and Compliance Training

    You will need to ensure all your employees are properly trained on the security policies and procedures. You may leverage a full featured learning management system (LMS) to develop, distribute, and track this training. JupiterOne also supports a simple process that allows your employees to access your security policies and procedures, and capture their acknowledgement.

  • Ongoing Security Awareness Training

    Ongoing security awareness training is foundational to the overall risk reduction for any organization, not to mention is a compliance requirement almost universally. Our recommendation is to leverage a vendor, Ataata, who provides a low-cost and engaging way to keep your folks trained. All it takes is less than 5 minutes of everyone's time to watch a fun video and take a quiz every month.

{{#needStandardHIPAA}}

  • Annual HIPAA Awareness Training

    If your organization is subject to HIPAA compliance, you must ensure all workforce members take a HIPAA awareness training annually. You may sign up with a vendor like Ataata to access training content, or alternatively, you may leverage an open-source training JupiterOne provides as a start. {{/needStandardHIPAA}}

Policy Management

  • Policy Management Process

    Your security policies and procedures are living documents. They should be reviewed, updated, and distributed on a regular basis. Our recommendation is to manage policy as code (e.g. as a git repo), and this procedure provides the details on how to do that.

Risk Management and Risk Assessment Process

  • Risk Management Process

    Risk management involves conducting risk assessment, risk analysis, risk mitigation and the continuous monitoring and management of risks. Risk management is a continuous process.

  • Risk Assessment and Analysis

    At least annually, a risk assessment should be conducted for your organization. A well established process helps your team perform the assessment and manage the outcome. The assessment itself is often performed manually, supported by tools for the assessment of technical risks, and management tools to help document and track the issues identified. You may document the issues directly in an issue tracking system such as Jira, or preferably, add the identified risks as objects in JupiterOne so that they can be visualized in context with the rest of your operational ecosystem.

  • Risk Mitigation and Monitoring

    Once the risks are identified and analyzed, they need to be addressed with appropriate mitigation plans and implementation of controls. The mitigating controls and residual risks should be continuously monitored and kept up-to-date.

  • Risk Registry

    In many cases, the risk registry is no more than a spreadsheet that serves as the inventory of risks identified as part of each risk assessment. Most mature enterprises implement a Governance, Risk and Compliance (GRC) solution to manage this process. However, a full blown GRC solution is complex and often overkill for a SaaS company. Instead, use JupiterOne to inventory and track your risks.

Compliance Audits and External Communications

  • Compliance Program Management

    You organization needs to define and document a process to identify and ensure compliance with applicable statutory, regulatory, and contractual requirements.

  • Requesting Audit and Compliance Reports

    You should have a pre-defined process for external entities to request audit and compliance reports.

System Audits, Monitoring and Assessments

  • Types of System Audits

    There are several forms of system audits and they are defined here.

  • Security Event Analysis

    Security logs, events, and audit trails should be reviewed on a regular basis. In a mature security practice, this is a major effort of the daily security operations. It should be monitored proactively instead of when a breach occurs. The sheer volume of events can quickly result in alert fatigue. JupiterOne's automated event analysis capability can help without the need of a dedicated and expensive Security Information and Event Management (SIEM).

  • Manual Internal Auditing Activities

    From time to time, an internal audit may be needed on controls and processes that are not already covered via automated monitoring. This process is defined here.

  • Audit Requests

    The procedure documents how audit requests are handled.

  • Review and Reporting of Audit Findings

    Upon completion of an audit or assessment, the report and findings should be analyzed so that follow up on actions can be taken accordingly.

  • Audit Trails - System and Application Security Events Logging Standard

    Your systems and applications should be configured/developed to follow a pre-defined, pre-approved set of standards for logging. This document captures the details, while it is up to your engineering team to follow in actual implementation. This can be enforced by other procedures such as configuration management and code reviews.

  • Audit Trail Integrity - Security Controls and Log Retention

    Audit trails should be immutable. It is crucial to protect audit trails for record keeping and forensic analysis. Audit logs shall be retained according to your business needs and regulatory compliance requirements.

  • Auditing Customer and Partner Activity

    You may want to have a process defined to monitor the security logs and account access activities for the customers of your product.

  • Tools Used for Auditing and Security Assessments

    This is a documentation of certain tools your team may choose to use for performing security audits and assessments (such as an internal vulnerability scan).

  • Tools Used for Auditing and Security Assessments

    Workforce members (and customers, if applicable) shall be informed and trained on the system auditing processes.

HR and Personnel Security

  • Acceptable Use of End-user Computing

    The acceptable use policy should be distributed to all employees. Employee review and acceptance of the acceptable user policy should be captured.

  • Employee Screening Procedures

    Background checks should be conducted as part of the hiring process, prior to an employee/contractor starting.

  • Employee Onboarding Procedures

    When new employees join your organization, a set of activities are required as part of their onboarding, such as training, access provisioning, and configuration of their workstations. This procedure documents that process, while the actual implementation of them are covered by their corresponding procedures and controls.

  • Employee Exiting/Termination Procedures

    Similar to employee onboarding, when someone leaves your organization, a set of actions shall be performed. This may include termination of access, return of equipment, etc.

  • Employee Issue Escalation

    As part of your HR operations, you should have a defined process for an employee to safely escalate an issue that might arise in the workplace.

  • Whistleblower Policy and Process

    Your organization should define policies and procedures to ensure a proper channel is established for reporting concerns and violations with respect to standards of business and personal ethics and conduct.

  • Non-Compliance Investigation and Sanctions

    All workforce members should be trained on and accept your organizational security policies and procedures. In the case of a violation, there should be a pre-defined procedure to identify, investigate, and fairly treat each incident.

Access

  • Standards for Access Provisioning

    You need to be able describe how your access control is implemented. For example, using role-based access control, unique account/ID for each user, automatic log on/log off, etc. These should match the configuration of your identity provider or access control system such as Okta.

  • Password Management

    You need to have policies/standards around password length, complexity, age, etc. Enough said.

  • Centralized Access Control and Single Sign On

    Your organization most likely relies on multiple business applications to support its operations. This may include end-user systems, collaboration tools, development and production environments, etc. Managing access to all of your business applications and systems centrally ensures consistent access policy and auditing. Being a cloud-native organization, we highly recommend using a cloud-based identity provider, such as Okta, OneLogin, Google and others for centralized access control and single sign on.

  • Multi-factor Authentication

    Passwords are hard to remember but easy to compromise. Even with long and complex passwords, it is no longer sufficient by itself as the only control to prevent unauthorized access to critical systems and data. Okta and other similar IdP vendors provide multi-factor authentication (MFA) capability as part of their offering, and it is very easy to enable especially if you already use it for single sign on.

  • Role Based Access Control (RBAC)

    Role based access control (RBAC) is an industry standard method for implementing access authorization to users. This is supported by most identity and access systems as 'Groups' and assigning users to the 'Groups' that match their job function/role.

  • Temporary Access to AWS Accounts and Resources

    We highly recommend leveraging the assume-role capability in AWS to gain temporary access to resources, combined with a cloud-native IdP for single-sign-on. This removes the need to provision IAM users directly within each of your AWS accounts.

  • VPN Remote Access

    Remote access is typically secured via VPN. This could be implemented as a EC2 instance running in your private subnet/VPC instead AWS, or a server on whatever private network in your hosted or internal environment. Pritunl is a lightweight, OpenVPN based solution that is free to start, and can scale as you grow. WireGuard is a good open-source option as well.

  • Access to PHI/ePHI

    Access to PHI/ePHI should be limited to those with a business need only, and protected by strong access control and auditing. We recommend using a combination of the native AWS IAM policies and single sign on (e.g. Okta) for access enforcement. Additionally, an extra layer of protection may be added to restrict risky or privileged actions. This can be implemented using Explicit Deny actions in the AWS IAM policies. A tool like Dome9 can help automate that process.

  • Platform Customer Access to Systems

    We strongly recommend against any direct customer access to systems, other than through the application interface, such as an authenticated Web UI or API interface. Depending on the nature of your solution, you will need to document how customer access their data and if they have direct access to the systems that host/process their data.

  • Access Establishment, Modification and Termination

    From time to time, you may need to add, change, or remove access to certain resources for an employee/contractor. It is required you have a process to capture the request, approval, and provisioning of such actions. If you already use an issue management tool like Jira, it is pretty straightforward to create a Service Desk project and manage it there.

  • Access Reviews

    Your security/audit/compliance team should perform regular access reviews to understand who has access to what. This is done in order to maintain the minimum need-to-know best practices when provisioning access. The access should be documented and updated regularly. Access no longer needed should be removed. This process typically involves a manual review of all business applications, systems, cloud accounts and mapping the level of access to each user and/or service. It can take days, if not weeks, to complete. JupiterOne helps streamline this process by automatically analyzing the access control relationships across the providers connected to the JupiterOne platform, and generate reports and visualization on demand.

  • Privileged Access

    A privileged user is someone who has administrative access to critical systems or data. This type of access should be highly restricted and managed with a more controlled process than typical/non-privileged user access. There are security solutions dedicated to privileged access management. However, you might not need to purchase and implement a separate tool if you follow our recommended procedure using cloud-native SSO, AWS IAM, enable IAM policy guard rails and leverage explicit Deny rules in certain policies.

  • Service Accounts

    In AWS, access given to application services and components are achieved using IAM roles, policies, and assume-role capability. The provisioning of such access should be managed as code. We find it simple and flexible to use Terraform to describe and provision infrastructure-as-code.

  • Employee Workstation / Endpoints Usage

    A set of standards and guidelines should be established so that employees understand their responsibility and limitation in using their company-provided computers. This is also referenced in the Employee Handbook. Technical controls should be in place to handle the monitoring and protection of employee computers, which is covered in a separate control/procedure.

  • Office Network and Wifi Access

    Network access should be protected for your internal/office environments, especially wireless access. We highly recommended not building physical walls around your critical/production data and leveraging cloud instead. Therefore, there should be no critical/production system or data on your office networks. This greatly reduces risk in your internal user environments. You still should have proper encryption for your wireless network. This can be done using something like Cisco Meraki, which provides API access for you to integrate with JupiterOne, or something as simple as Google Wifi.

  • Production Access and Secrets Management

    In additional to privileged user access, how do your applications and services gain access to keys and secrets in production? You need tools and controls around that. If you are in AWS, we find it best to use AWS Key Management Service (KMS) to manage data encryption keys, and AWS Systems Manager (SSM) Parameter Store to store secrets such as API keys. You will need to read up on their corresponding documentation on how to implement for your applications.

  • Password Reset and other Helpdesk Requests

    If you are a startup, password reset is most likely self service. In any case, if there is a need for someone with Administrative access to help someone else reset their password, a process should be properly followed for audit and compliance. This is pretty straightforward if you just implement a Service Desk project in Jira. It can be the same IT & Security service desk project that you use to manage other similar tickets.

Facility Access and Physical Security

  • Physical Security

    Don't forget physical security. Even though your office environment may not have critical/production systems or data, you probably don't want strangers wondering around unescorted. You probably need some kind of badge access, which may already be provided to you as part of your lease. You'll most likely need to edit this documentation with your facilities details. If you choose to implement video surveillance, Cisco Meraki is a pretty good choice.

Asset Inventory Management

  • Physical Asset Inventory

    You will need to maintain an up-to-date inventory of your physical assets, such as servers, laptops, printers, networking gear, etc. You can enter those information directly into JupiterOne instead of using a spreadsheet or purchasing a separate dedicated software for it.

  • Digital Asset Inventory

    You will need to maintain an up-to-date inventory of your physical assets, such as virtual machine instances, database instances, data repositories, etc. JupiterOne can automate that for you. All you need to do is configure the providers, such as AWS, in JupiterOne and it'll take care of the rest.

  • Paper Records

    We are in the age of the cloud, are we not? Let's not use paper records for any sensitive data, and this procedure indicates so.

Data Management

  • Data Classification Model

    How do you know what data to protect and how to protect it accordingly? Taking a one-size-fits-all approach is not the best approach to data security. Treating all data the same way is like saying I'm going to put the strongest lock on every door of my house, but whoever needs access, I'll just hand over the same key. Having a good data classification is paramount to your data protection strategy. We recommend four levels of classification - Critical, Confidential, Internal, and Public. This documentation describes the details.

  • Data Handling Process

    How data is handled, including the retention period and whether or not encryption of data is required, should be defined based on the company data classification model.

  • Data Inventory and Lifecycle Management

    Keep an up-to-date inventory for all of your data repositories, properly tag data according to their data classification. The lifecycle of data should be tracked from its creation to deletion.

  • Data Backup and Recovery

    AWS provides native backup and recovery capability for many of its services, such as DynamoDB, RDS, and EBS Volumes. For S3, you can copy data to a different S3 bucket in a different region/account.

  • Data Deletion Procedures

    You should only keep data for as long as needed per business and/or regulatory requirements. A well defined process should be in place to securely delete data when necessary. For systems that you self manage, using a secure wipe utility such as Shred is usually sufficient. For data managed in the cloud, you should follow the documented procedures from the cloud service provider such as AWS.

Data Protection

  • Data Protection Implementation and Processes

    You need to properly document how data is protected according to its classification. This should cover controls such as encryption and access control for data at rest, data in transit, and data in use.

  • Protecting Data At Rest

    Data-at-rest refers to persistent data storage, including physical media such as laptop hard drives, virtual data volumes such as Elastic Block Store (EBS) in AWS, and logical data repository such as S3 Buckets in AWS. Strong encryption, typically AES-256, and key management is typically required to protect data-at-rest.

  • Protecting Data In Transit

    Data-at-rest refers to data being transmitted from one system/service to another, either internally or across an open network (e.g. the Internet). Encryption is required, typically in the form of HTTPS/TLS, SSH or IPSec VPN.

  • Protecting Data In Use

    Data-in-use refers to active data being processed by systems and applications. Application layer security capabilities and access control mechanisms typically apply.

  • Encryption Key Management

    Encryption is only as strong as its associated key management process.

  • Certificate Management

    SSL/TLS certificates should be managed and monitored.

  • Data Integrity Protection

    There may be additional considerations for data integrity protection applicable to your applications and environments, in addition to data encryption.

Secure Software Development and Product Security

  • Software Development Process

    How do you ensure security in your product development lifecycle? There are specific controls such as static application security testing (code scanning) that are documented individually. Here, you need to start with documentation the overall software development process and standards your development team follows.

  • Source Code Management

    A source code management system such as GitHub, Bitbucket or GitLab should be used.

  • High Level Application Security Requirements

    A set of high level application security requirements should be defined. This is the foundation for training your development team on secure coding, and it serves as the basis for security considerations throughout your product design. OWASP is referenced as a key part of the high level requirements.

  • Secure Design and Application Threat Modeling

    Security should be built in to your application / product as early as possible, starting from the design phase. Proper security consideration and even formal threat modeling can help dramatically reduce risk around application logic flaws, that are difficult to uncover with any scanning software, often lead to significant adverse impact, and are the most costly to fix down the road.

  • Access Control of the Application (Identification, Authentication, Authorization, Accounting)

    If your organization develops external facing applications with access to customer data, such as PII/ePHI, you must implement and document mechanisms for user identification and access control.

  • Free and Open Source Software (FOSS) Security

    Modern software development is much more than first party code. The open source dependencies used in your software application should be scanned for vulnerability to ensure they do not put your offerings and customers at risk. Our recommended solution to scan for open source package vulnerabilities and licensing issues is Snyk.io. Snyk's engine also powers Javascript libraries linting in Microsoft Sonar and Google Chrome browser.

  • Static Application Security Testing (SAST)

    The software code wrote by your developers should be scanned for vulnerability before putting into production. Veracode, WhiteHat, etc. are example solutions that support most modern programming languages such as Java, Javascript, Python, etc.

  • Dynamic Application Security Testing (DAST)

    In additional to static code analysis, a dynamic application scan should be performed regularly. This is a blackbox testing of the application from an external perspective. Suitable solutions for dynamic scanning include Tenable, Veracode, Rapid7, Qualys, and OWASP Zap. Keep in mind that dynamic application scanning helps uncover many vulnerabilities but it is not a replacement for application penetration testing.

  • Application Penetration Testing

    An external penetration testing is performed at least once a year by a qualified security professional. Many compliance frameworks require this to be done by an external third party security vendor. We also strongly recommend having a public vulnerability disclosure program, often known as bug bounty, to leverage crowd-sourced security researchers to perform continuous testing of your external-facing applications. The recommended vendor is HackerOne (BugCrowd is also a good alternative).

  • Outsourced Software Development

    If you leverage outsourced resources for software development, a formal set of requirements and processes must be established to ensure the quality and security of the product.

{{#needStandardHIPAA}}

  • HIPAA Best Practices for Software Development

    Certain security and compliance best practices shall be communicated to the development teams, such as the requirement to use only HIPAA BAA eligible services to process ePHI in the Cloud. {{/needStandardHIPAA}}

Configuration and Change Management

  • Configuration Management Processes

    There are many approaches to configuration management. Our recommendation for a Cloud/SaaS technology organization or team is to let the users manage the devices themselves, but provide them the requirements and automation scripts as necessary, and use an endpoint audit agent to check for compliance. JupiterOne provides a 'power-up' endpoint compliance agent that is based on Netflix's Stethoscope project. Osquery is a good alternative as well.

  • Production Systems Provisioning

    Defines the standards and processes for provisioning and promoting systems into production.

  • User Endpoint Security Controls and Configuration

    Define the security controls and configuration standards for end-user systems. A provisioning management system may be used, or this can be accomplished via a set of automation scripts that runs on each local system to handle the initial configuration. For end-user systems that are self managed by each employee, you should provide them with the configuration standards and the automation scripts, if applicable.

  • Server Hardening Guidelines and Processes

    Define the standards for provisioning and hardening a new server system based on its operating system and operating environment. A provisioning management system may be used, or this can be accomplished via a set of automation scripts that runs on each local system to handle the initial configuration. For end-user systems that are self managed by each employee, you should provide them with the configuration standards and the automation scripts, if applicable.

  • Configuration and Provisioning of Management Systems

    Define the standards for provisioning and hardening a new system based on its operating system and operating environment. A provisioning management system may be used, or this can be accomplished via a set of automation scripts that runs on each local system to handle the initial configuration. For end-user systems that are self managed by each employee, you should provide them with the configuration standards and the automation scripts, if applicable.

  • Configuration and Management of Network Controls

    You may have a combination of cloud and on-premise networks. Certain network layer security controls should be in place, such as firewalls for traffic filtering, Subnets/VLANs for segregation, IDS/IPS, etc. For traditional on-premise networks, these controls are typically physical or virtual appliances. In the Cloud, these are often infrastructure and platform services you should enable.

  • Provisioning AWS Accounts

    Your cloud environment should be configured using multiple types of software-defined boundaries. The cloud infrastructure should be provisioned and managed as code. In AWS, this can be done via CloudFormation. However, our recommendation is to use Terraform. We find Terraform more flexible and it supports multiple cloud service providers including AWS, Azure, and GCP.

  • Deploying Changes to AWS

    Infrastructure-as-code is a key element of Cloud DevOps. This procedure documents the details around process and automation for deploys into AWS environments, for both infrastructure changes and application changes.

  • Patch Management Procedures

    The simplest way to ensure your end-user systems are patched is to enable auto-update. You can use the same configuration compliance audit agent to ensure auto-update is turned on for all systems (Windows, macOS, Linux) in your environment. Additionally, for systems in AWS, the recommended solution is - don't patch, replace. Have a process to update your AMIs to the latest version when it's made available and/or regular update the AMIs approved to use in your production environment and ensure the new EC2 instances always use the latest approved AMIs.

  • Production Deploy / Code Promotion Processes

    Each production deploy should follow a defined process to ensure proper review, approval and traceability. This can be fully automated using the appropriate code integrated with your continuous integration / continuous deploy orchestration such as Jenkins or Travis CI.

  • Emergency Change

    Emergency conditions should be considered. Should there be a need for an emergency change that cannot follow your typical change management process, this emergency process should be followed instead.

Threat Detection and Prevention

  • Malware Protection

    Anti-malware continue to be a compliance requirement, although traditional AV solutions have been proven to be ineffective against zero-day attacks and advanced malware. Modern operating systems usually come with some basic malware defense capability, such as Windows Defender. You may also consider something like ClamAV as a free, open-source solution to meet compliance needs. But for real security, we highly recommend a next generation endpoint protection solution such as Carbon Black Cb Defense or SentinelOne.

  • Firewall Protection

    Firewall protection should be enabled at the appropriate layers, including network, host and application.

  • Network Intrusion Detection

    AWS GuardDuty analyzes VPC flow logs, DNS logs, and CloudTrail logs for intrusion detection and threat monitoring at both the network and API layer. If you operate an internal on-premise network or your own data center, a network intrusion detection system is a must. Cisco Meraki has a basic intrusion detection capability that can be a good starting solution.

  • Host Intrusion Detection

    AWS Inspector is a native offering that covers vulnerability scanning of EC2 instances. For agent-based host intrusion detection, we recommend OSSEC agents as a basic open-source based solution. OSSEC supports a variety of operating systems both in the cloud and on-premise. A commercial solution may be needed for Docker containers activity monitoring. For Windows and macOS end-user systems, Carbon Black Cb Defense or SentinelOne are both good next-generation endpoint protection solutions that cover intrusion detection/prevention via advanced behavior analysis as well as malware protection.

  • Web Application Protection

    If you have an external web application in your product portfolio, you should definitely consider deploying a web application firewall and protection against DDoS attacks. Luckily, AWS got you covered with some native service offerings, including AWS WAF, CloudFront rate limiting, and AWS Shield.

  • Centralized Security Information and Event Management

    JupiterOne provides excellent automated event analysis and alerting capability out of box. You may also choose to implement a centralized log management and/or security information and event management (SIEM) solution such as Splunk or Sumo Logic.

  • Threat Intelligence Monitoring

    As part of your ongoing security operations, you need to be informed of new regulations, compliance requirements, as well as valuable external threat intel that might help your spot indicators of compromise in your own environments. A good source of intel is the various Sector-based Information Sharing and Analysis Centers (ISACs). For example, if you are in the healthcare industry, it is recommended for you to become a member of the National Health Information Sharing and Analysis Center (NH-ISAC).

Vulnerability Management

  • Vulnerability Scanning and Infrastructure Penetration Testing

    Vulnerability scanning for your infrastructure (not applications) is a must. OpenVAS is an excellent open source solution that you can run yourself.

  • Security Findings Reporting, Tracking and Remediation

    Vulnerability findings can come from a variety of sources, such as open source dependency scanning, static application code analysis, dynamic application security testing, penetration testing, infrastructure vulnerability scanning, etc. Tracking the vulnerabilities and ensure they are remediated in a timely manner can be an exhausting task if handled manually. JupiterOne can connect to the various vulnerability sources and help manage them in a consistent and automated manner. The vulnerability management program including the detailed process and SLA levels, should be well defined.

Mobile Device Security and Media Management

  • Media Disposal Process

    You must ensure media containing critical / sensitive data (such as ePHI) is disposed of securely.

  • Use of USB Flash Drive and External Storage Device

    If removable media, such as USB flash drives, must be used to store sensitive data, security precautions must be taken. IronKey or similar devices that support hardware encryption is a good choice. However, it is much better to not to store any sensitive data on removable media devices to start with.

  • Support and Management of BYOD Devices

    You may not support bring-your-own-device (BYOD) for your employees. If you do, a mobile device management (MDM) solution should be in place to properly manage them. If you already use Okta as your IdP, they have a lightweight MDM solution you can enable from the same vendor. Alternatively, AirWatch or Jamf (Apple devices only) are also good solutions.

Business Continuity and Disaster Recovery

  • BCDR Objectives and Roles

    You should have a plan and procedures for business continuity and disaster recovery. The process should be documented and tested. This is mostly a manual effort. First and foremost, clear objectives should be established and a team with specific roles and responsibilities should be assigned.

  • General Disaster Recovery Procedures

    Document the DR procedures including notification of a disaster, activation of the DR process, recovery and reconstitution.

  • BCDR Testing and Maintenance

    The business continuity and disaster recovery plan and process should be regularly tested and maintained. This can be in the form of tabletop exercise, simulation and/or technical testing such as data restore.

  • Work Site Recovery

    You should include a process that describe how you recover from a physical disaster at a work site, or your own physical data center, if applicable.

  • Application Service Event Recovery

    You should include a process that describe how you recover from a service outage that impacts your application, including notification to users/customers.

  • Production Environments and Data Recovery

    You should include a process that describe how you recover your production environments and data.

Incident Response

  • Security Incident Response Team (SIRT)

    To support incident response efforts, you should form a security incident response team. If you do not have dedicated security operations resources, this team can be made up with your engineering and DevOps resources. They are the go-to person when an inevitable incident occurs.

  • Incident Management Process

    In the inevitable event of a security incident, you should have a tested process to follow instead of panicking at the moment of impact.

  • Incident Categories and Playbooks

    A set of playbooks are referenced here according to the defined categories of incident. This can be done manually by following the playbooks. As your security practice matures, you may later consider implementing a dedicated incident response / forensic solution.

  • Emergency Operations Mode

    If a security incident escalates into an emergency situation, you should have a set of pre-defined procedures to avoid unrecoverable data loss.

  • Tabletop Exercise

    Practice makes perfect. Perform drills according to incident response procedures, playbooks, and emergency procedures so that you know what to expect in an real event.

Breach Investigation and Notification

  • Breach Investigation and Notification Process

    Wish for the best and prepare for the worst. In the unfortunate event that a breach occurs, you need to have defined procedures for the investigation and notification of such breach.

  • Platform Customer Responsibilities in a Possible Breach

    A breach is sometimes caused by the customer and not you. You should clearly define and communicate such responsibilities to your customers.

  • Sample Notification Letter to Customers in Case of Breach

    If a breach is confirmed, you are legally obligated to notify your customers. A notification template helps your streamline this process.

Third Party Security and Vendor Risk Management

  • Vendor Technology Risk Review

    A technology risk review / security assessment should be conducted prior to engaging with a vendor that involves any type of data exchange, technical integration or professional services. There are a number of options on commercial IT Risk Vendor Management solutions. However, instead of jumping in on one of those, we recommend starting with Google's open-source Vendor Security Assessment Questionnaires (VSAQ). Its Github repo has detailed usage instructions.

  • Vendor Contractual Agreements

    Your vendors and subcontractors must meet certain legal and contractual requirements under regulations such as HIPAA - Business Associate Agreement (BAA), and GDPR - Data Processing Agreement (DPA).

  • Software and Systems Acquisition Process

    You should maintain a list of approved software and vendors. A process should be defined and agreed on with your procurement lead for the acquisition of new system or software.

Privacy Practice and Consent

  • Privacy, Terms and Consent Notices

    Create and publish Privacy Policy, Notice of Privacy Practices, as well as Terms and Conditions for using your product, as applicable. Any change should be promptly and formally communicated to all customers.

Addendum and References

  • Key Definitions

  • Employee Handbook

  • Approved Software

  • Approved Vendors

  • Cookie Policy

  • Privacy Policy

  • HIPAA Business Associate Agreement

  • GDPR Data Processing Agreement

  • HIPAA Controls Mapping

  • HITRUST Controls Mapping

  • NIST Controls Mapping