Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
pub:trust_center:controls [15.06.2025 22:03] – created Predrag Tasevski | pub:trust_center:controls [15.06.2025 22:09] (current) – [Table] Predrag Tasevski | ||
---|---|---|---|
Line 8: | Line 8: | ||
- | ^ MVSP Area ^ Control ^ Implementation ^ | + | ^ MVSP Area ^ Control |
- | | Business Controls | External vulnerability reports | Reports accepted via `/security` page, tracked in IRIS, linked to Git issues. | + | | Business Controls |
- | | Business Controls | Customer testing | Clients may request sandbox environments; | + | | Business Controls |
- | | Business Controls | Self-assessment | Annual MVSP audit tracked in **Unicis Cybersecurity Controls** module. Responsible roles managed in OpenProject; | + | | Business Controls |
- | | Business Controls | External testing | Annual pentests performed. Findings tracked in **Unicis Cybersecurity Controls** and resolved in OpenProject. Results referenced in IRIS. | | + | | Business Controls |
- | | Business Controls | Training | Awareness and secure dev training delivered via Unicis Awareness Module. Participation tracked per user. | | + | | Business Controls |
- | | Business Controls | Compliance | ISO 27001, GDPR, MVSP mapped in **Unicis Cybersecurity Controls**. Regional segmentation enforced via Mautic. | | + | | Business Controls |
- | | Business Controls | Incident handling | All incidents logged and resolved in IRIS. Escalation flows managed with SLAs (e.g. 72h for breaches). n8n used for automated notifications. | | + | | Business Controls |
- | | Business Controls | Data handling | End-of-life handling logged in OpenProject. Data deletion procedures follow checklist in **Unicis Cybersecurity Controls**. | | + | | Business Controls |
- | | Application Design Controls | Single Sign-On (SSO) | SSO (e.g., Keycloak) | + | | Application Design Controls |
- | | Application Design Controls | Multi-Factor Authentication (MFA) | MFA required for all critical systems using TOTP or YubiKey. Enforced at SSO level. | | + | | Application Design Controls |
- | | Application Design Controls | HTTPS-only | HTTPS enforced sitewide with HSTS; Let’s Encrypt certs auto-renewed. | | + | | Application Design Controls |
- | | Application Design Controls | Security Headers | CSP, X-Frame, HSTS, etc. enforced by server and app; tested on CI/CD deploys. | | + | | Application Design Controls |
- | | Application Design Controls | Password policy | SSO enforces 12+ character passwords; passphrases supported; | + | | Application Design Controls |
- | | Application Design Controls | Security libraries | Shared internal security modules reviewed periodically. | | + | | Application Design Controls |
- | | Application Design Controls | Dependency patching | Monitored via Dependabot/ | + | | Application Design Controls |
- | | Application Design Controls | Logging | Wazuh collects auth and admin logs. Logs retained ≥180 days. Alerts forwarded to IRIS. | | + | | Application Design Controls |
- | | Application Design Controls | Encryption | AES-256 at rest, TLS 1.3 in transit. Secrets handled securely; API keys scoped and rotated. | | + | | Application Design Controls |
| Application Implementation Controls | List of data | Data types (PII, etc.) documented in EspoCRM. Models versioned in Git and listed in Nextcloud. | | | Application Implementation Controls | List of data | Data types (PII, etc.) documented in EspoCRM. Models versioned in Git and listed in Nextcloud. | | ||
Line 34: | Line 34: | ||
| Application Implementation Controls | Build process | CI/CD pipelines enforce clean builds, no hardcoded secrets. Provenance signed and tracked. | | | Application Implementation Controls | Build process | CI/CD pipelines enforce clean builds, no hardcoded secrets. Provenance signed and tracked. | | ||
- | | Operational Controls | Physical access | Data centers via Hetzner/ | + | | Operational Controls |
- | | Operational Controls | Logical access | RBAC + SSO + MFA enforced. Access reviews quarterly using **Unicis Cybersecurity Controls**. Inactive accounts deactivated by n8n. | | + | | Operational Controls |
- | | Operational Controls | Sub-processors | Public DPA maintained. Sub-processors reviewed annually and stored in Nextcloud. Linked to **Unicis Cybersecurity Controls**. | | + | | Operational Controls |
- | | Operational Controls | Backup & Disaster Recovery | Daily encrypted backups, restore tests monthly. Logged in OpenProject, | + | | Operational Controls |