Cloud Security White Paper - For Clarizen services running on Amazon Web Services

Page created by Jimmie Harper
 
CONTINUE READING
Cloud Security White Paper - For Clarizen services running on Amazon Web Services
Cloud Security
White Paper
For Clarizen services running on Amazon Web Services
January 2021
Cloud Security White Paper - For Clarizen services running on Amazon Web Services
Introduction
Enterprises today rely on third-party software and services to handle
business-critical processes and operations. Whether on-premises or in a
hybrid cloud architecture, these solutions must provide a level of security
that protects critical company data while minimizing business risk. This
white paper addresses security controls, and best practices deployed by
Clarizen to support Clarizen services in the cloud.

The Clarizen Cloud is designed, built, maintained, monitored, and regularly

updated with enterprise grade security included by design. Clarizen
leverages Amazon Web Services (AWS), the industry leading cloud platform.
The shared security responsibility model is a framework adopted by cloud
providers. Under this model, AWS is exclusively responsible for physical
security, while application, infrastructure, and operational security controls
are implemented, deployed, and monitored by the Clarizen security and

compliance team.
Cloud Security White Paper - For Clarizen services running on Amazon Web Services
Application Security
APPLICATION SECURITY

       Encryption                                                           Passwords
       DATA AT REST ENCRYPTION                                              PASSWOD POLICY
       Clarizen deploys industry-leading encryption algorithms,             Clarizen’s strong password policy requirements govern the
       Advanced Encryption Standard (AES) 256, to secure all our            creation, protection and frequency of password changes. These
       customer data. This ensures that sensitive data stored on AWS        requirements serve as a baseline or minimum recommended
       is not readable by any user or application without a valid key.      password requirement. Passwords are transmitted via
       Clarizen deploys data at rest encryption to all elastic blocks,      a hypertext transfer protocol secured (HTTP with TLS)
       simple storage services and S3 buckets.                              connection that encrypts communication between the web
                                                                            server and browser and secures the identification of the web
       DATA IN TRANSIT                                                      server.
       Upon sending any data between the user browser and
       Clarizen, a secure TLS connection (a cryptographic protocol          PASSWORD PROTECTION
       that provides communications security over public computer           Clarizen takes a multi-level approach to storing all sign-in
       networks) is established encrypting all communication between        credentials. Protection begins with “hashing” passwords, a
       the web server and the client. Additionally, Clarizen secures        common approach for taking passwords of varied lengths and
       the identification of the web server via an industry leading         turning them into cryptic, fixed-length phrases for storage.
       certificate authority.                                               Clarizen also “salts” customer passwords, to add extra data
                                                                            that is unique, and random, to every HASH to employ an
       Authentication                                                       additional level of password protection.
       Users can authenticate to Clarizen with a password in one of
       two ways: delegated authentication or local password.                Penetration tests
                                                                            EXTERNAL SECURITY AUDITS
       DELEGATED AUTHENTICATION                                             Clarizen engages external security testers and professional
       When users authenticate with their Office 365 credentials or         application auditors on an annual basis as part of its security
       Clarizen One login credentials, passwords are maintained and         testing processes. These experts perform penetration tests using
       stored within the provider. This model of authentication is called   the Open Web Application Security Project (OWASP) Top Ten
       delegated authentication. When delegated authentication is           methodology for multiple attack scenarios in conjunction with
       configured, the customer’s password policy for Office 365 or         several internally developed and managed proprietary attack
       Clarizen One is enforced.                                            methodologies and scenarios.

       LOCAL AUTHENTICATION                                                 PENETRATION TEST SUMMARY REPORT
       When users authenticate to Clarizen with a local password,           Penetration test summary reports are provided to customers
       Clarizen integrates with Okta, the leading identity and access       upon request. This includes all test findings, along with all
       management platform. Passwords are stored in the Okta                remedial actions taken to address any issues that may have
       cloud and are encrypted using bcrypt salt with a high number         been identified during the test.
       of rounds to protect the passwords. Unlike other hashing
       algorithms designed for speed and thus susceptible to rainbow        Application content filtering
       table or brute-force attacks, bcrypt is very slow and an             WEB TRAFFIC INSPECTION AND SANITATION
       adaptive function, meaning its hash function can be made more        To prevent all forms of cross-site scripting (XSS), SQL injection
       expansive and thus slower as computing power increases.              and other such malicious attacks, Clarizen has fully integrated a
                                                                            proprietary sanitation engine into the platform, which inspects
                                                                            all incoming traffic to the web server.

Copyright © Clarizen. All rights reserved.                                                                               4
Infrastructure
Security
INFRASTRUCTURE SECURITY

       Network security                                                      Access control
       DISTRIBUTED DENIAL OF SERVICE [DDoS] PROTECTION                       NETWORK FIREWALLS
       Clarizen deploys AWS Shield to leverage DDoS mitigation               Clarizen has deployed Amazon’s Security Group in its cloud
       techniques. AWS provides enhanced resource-specific                   architecture. Security Groups act as network firewalls designed
       detection and employs advanced mitigation and routing                 to protect the Clarizen instance from east-west and north-south
       techniques for sophisticated or larger attacks.                       data center unauthorized traffic. Security Group also controls the
                                                                             inbound traffic to the Clarizen Virtual Private Network.
       MAN IN THE MIDDLE [MITM ] ATTACKS
       Servers automatically generates new SSH host certificates             LEAST PRIVILAGE
       on first boot and logs them into the Clarizen console. Clarizen       Clarizen deploys identity and access management with a “least
       leverages secure APIs to access the host certificates before          privilege” approach to control and manage the access layer for
       logging into an instance for the first time.                          the Clarizen cloud infrastructure. Additionally, Clarizen relies on
                                                                             complex password policies being enforced that include minimum
       [IP] SPOOFING                                                         length, alphanumeric character requirements, and usage
       Servers running on the AWS network cannot send spoofed                frequency to rotate user passwords.
       network traffic. The AWS controlled, host-based firewall
       infrastructure does not permit an instance to send traffic with a     TWO-FACTOR [2FA] AUTHENTICATION
       source IP or MAC address other than its own.                          Clarizen administrative access to the guest-host operating
                                                                             systems requires the use of two-factor authentication.
       PORT SCANNING                                                         Clarizen deploys software-based tokens on all our cloud-
       Unauthorized port scans are a violation of the AWS Acceptable         administered devices.
       Use Policy (AUP). Violations of the AUP are taken seriously, and
       every reported violation is investigated. When unauthorized port      ANTI MALWARE PREVENTION
       scanning is detected, it is stopped and blocked. Port scans of        Clarizen deploy OPSWAT Metadefender to ensure advanced
       Amazon EC2 instances are ineffective because, by default, all         threat detection and prevention.
       inbound ports on Amazon EC2 instances are closed.
                                                                             All files uploaded to Clarizen are scanned by multi engine
       PACKET SNIFFING                                                       scanning technology to ensure files are free from viruses
       It is not possible for a virtual instance running in promiscuous      malware and malicious content.
       mode to receive or “sniff” traffic that is intended for a different
       virtual instance. Even two virtual instances that are located
       on the same physical host cannot listen to each other’s traffic.
       Attacks such as ARP cache poisoning do not work within
       Amazon EC2.

Copyright © Clarizen. All rights reserved.                                                                                6
INFRASTRUCTURE SECURITY

       Network architecture

Copyright © Clarizen. All rights reserved.         7
INFRASTRUCTURE SECURITY

       The following practices are followed to prevent
       unauthorized access to the Clarizen instance:                                       CLOUDGUARD

                                                                                            MONITORING

       Vulnerability management
       VULNERABILITY SCANNING AND PATCH MANAGEMENT
       Clarizen automatically scans all production cloud assets for vulnerabilities or
       deviations from industry practices. Clarizen leverages the Amazon Inspector
       service to secure all workloads. Detailed findings are regularly communicated to
       the Clarizen management team.

       Identified and validated vulnerabilities are prioritized and assigned an
       appropriate remediation rating process according to the type of issue, its
       impact severity, and exposure. Patches are deployed to the infrastructure after
       passing required quality assurance and UAT tests according to a management
       approval process.

       Continuous security monitoring
       CLOUD GUARD
       Clarizen deploys Check Point CloudGuard, to ensure continuous security
       monitoring for comprehensive, real-time cloud security and compliance
       automation. The Clarizen security team can visualize and assess current
       security posture, detect misconfigurations in real time, model and actively
       enforce security best practices, and protect against identity theft and data loss
       in the cloud.

Copyright © Clarizen. All rights reserved.                                                         8
Operation
Security
OPERATION SECURITY

       Operation security
       DATABASE BACKUP                                                   of segregation of duties and least privilege, the Clarizen
       Clarizen leverages Amazon RDS snapshots to automate               Cloud Administrators are responsible for maintaining the
       the cloud database backup process and validate restore            production environment, including code deployments. Cloud
       capabilities. These database snapshots create a storage           administrative access is based on the concept of least
       volume copy of the cloud database instance and back up the        privilege. Clarizen users are limited to the minimum set of
       entire instance—not just individual databases.                    privileges required to perform their jobs.

       DATABASE REPLICATION AND DISASTER RECOVERY                        Personnel security
       Clarizen utilizes Amazon Availability Zones to replicate our      HIRING POLICY
       cloud databases and ensure disaster recovery goals are            Before hiring, Clarizen employees undergo background checks
       met. Customer data is stored in the primary database which        where permitted by law. The pre-employment evaluation
       is replicated in real time to the secondary database that is      includes criminal and dishonest behavior indicators.
       located in a separate physical zone.
                                                                         After hiring, employees and contractors are made aware of their
       BACKUP RETENTION                                                  job responsibilities, Clarizen operational and security policies, as
       Backup files of the cloud database are saved according to the     well as repercussions for failure to adhere to said responsibilities
       Clarizen backup retention policy which is monitored by the        and policies.
       Clarizen compliance team. Clarizen’s retention policy is set to
       30 days.

       SERVICE MONITORING
       Clarizen products are monitored 24/7, using external and
       internal probes to monitor service availability and security
       issues. These probes are configured to send alerts on a
       wide variety of criteria, including security, availability and
       performance degradation. The Clarizen system status
       site provides real-time information about Clarizen service
       availability in a clean and easy-to-read format.
       https://status.clarizen.com/

       LOG ANALYSIS
                                                                                                               Clarizen
       Clarizen collects servers and application logs to identify
       anomalies or any events that are relevant to the security,
       availability and performance of the Clarizen platform.

       LEAST PRIVILEGE ACCESS POLICY
       Clarizen requires that all access to its cloud infrastructure,
       application, and data be controlled based on business
       and operational requirements. Following the principles

Copyright © Clarizen. All rights reserved.                                                                             10
Physical
Security
PHYSICAL SECURITY

       AWS data center security
       Clarizen has a physical security strategy focused on preserving         CLIMATE AND TEMPERATURE
       the confidentiality, integrity, and availability of our services from   AWS data centers use mechanisms to control climate and
       physical threats. The enterprise-grade secure infrastructure            maintain an appropriate operating temperature for servers
       provided by AWS holds a wide range of certifications backed by          and other hardware to prevent overheating and reduce the
       various security controls.                                              possibility of service outages. Personnel and systems monitor
                                                                               and control temperature and humidity at appropriate levels.
       SURVEILLANCE & DETECTION
       Physical access is controlled at building ingress points by             FIRE DETECTION AND SUPPRESSION
       professional security staff utilizing surveillance, detection           Data centers are equipped with automatic fire detection
       systems, and other electronic means. All ingress and egress             and suppression equipment. Fire detection systems utilize
       points to server rooms are secured with devices that require            smoke detection sensors within networking, mechanical,
       everyone to provide multi-factor authentication before being            and infrastructure spaces. These areas are also protected by
       granted entry or exit. Physical access points to server rooms           suppression systems.
       are recorded by Closed Circuit Television Camera (CCTV)
       and all images are retained according to legal and compliance           REDUNDANCY
       requirements.                                                           Data centers are designed to anticipate and tolerate failure
                                                                               while maintaining service levels. In case of failure, automated
       POWER                                                                   processes move traffic away from the affected area. Core
       AWS data center electrical power systems are designed to be             applications are deployed to an N+1 standard, so that in the
       fully redundant and maintainable without impact to operations,          event of a data center failure, there is sufficient capacity to
       24 hours a day. Data centers are equipped with back-up power            enable traffic to be load-balanced to the remaining sites.
       supply to ensure power is available to maintain operations in
       the event of an electrical failure for critical and essential loads
       in the facility.

                                                                               Given the importance of
                                                                               access control mechanisms,
                                                                               Clarizen continuously
                                                                               monitors and tests its
                                                                               security system and
                                                                               processes, to ensure they
                                                                               are functioning properly.

Copyright © Clarizen. All rights reserved.                                                                                  12
PHYSICAL SECURITY

          In addition to leveraging AWS for physical security at
                                                                             that sets out requirements and best practices for a systematic
          data centers, Clarizen provides security at our offices.
                                                                             approach to managing company and customer information
                                                                             that’s based on periodic risk assessments appropriate to ever-
                                                                             changing threat scenarios.

                                                                             FEDRAMP
                                                                             Federal Risk and Authorization Management Program
                                                                             Compliant Cloud Service Provider. Core infrastructure
                                                                             component testing includes testing performed by a FedRAMP
                                                                             accredited Third-Party Assessment Organization (3PAO) and
                                                                             has been granted two Agency Authority to Operate (ATOs)
       AWS - Data center security certifications                             by the US Department of Health and Human Services (HHS)
       SOC II TYPE II                                                        after demonstrating compliance with FedRAMP requirements
       The SOC 2 report is an attestation report that expands                at the Moderate impact level. All U.S. government agencies
       the evaluation of controls to the criteria set forth by the           can leverage the AWS Agency ATO packages stored in the
       American Institute of Certified Public Accountants (AICPA)            FedRAMP repository to evaluate AWS for their applications
       Trust Services Principles. These principles define leading            and workloads, provide authorizations to use AWS, and
       practice controls relevant to security, availability, processing      transition workloads into the AWS environment. The two
       integrity, confidentiality, and privacy applicable to service         FedRAMP Agency ATOs encompass all U.S. regions (the AWS
       organizations. SOC 2 is an evaluation of the design and               GovCloud (US) region and the AWS US East/West regions).
       operating effectiveness of controls that meet the criteria for the
       security and availability principles set forth in the AICPA’s Trust   GDPR
       Services Principles criteria.                                         The European Union’s General Data Protection Regulation
                                                                             (GDPR) protects European Union data subjects’ fundamental
       ISO 27001                                                             right to privacy and the protection of personal data. It
       ISO 27001 certification for Information Security Management           introduces robust requirements that will raise and harmonize
       System (ISMS) covers infrastructure, data centers, and services.      standards for data protection, security, and compliance. AWS-
       ISO 27001/27002 is a widely-adopted global security standard          based services comply with GDPR.

Copyright © 2021 Clarizen. All rights reserved.
You can also read