Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
pub:trust_center:controls [15.06.2025 22:03] – created Predrag Tasevskipub:trust_center:controls [15.06.2025 22:09] (current) – [Table] Predrag Tasevski
Line 8: Line 8:
  
  
-^ MVSP Area ^ Control ^ Implementation ^ +^ MVSP Area          ^ Control                         ^ Implementation                                                                                                                                  
-| Business Controls | External vulnerability reports | Reports accepted via `/security` page, tracked in IRIS, linked to Git issues. Triage process monitored via EspoCRM and alerts automated via n8n. +| Business Controls  | External vulnerability reports  | Reports accepted via `security.txt` page, tracked in IRIS, linked to Git issues.                                                                
-| Business Controls | Customer testing | Clients may request sandbox environments; tests are isolated and monitored. Guidelines provided. | +| Business Controls  | Customer testing                | Clients may request sandbox environments; tests are isolated and monitored. Guidelines provided.                                                
-| Business Controls | Self-assessment | Annual MVSP audit tracked in **Unicis Cybersecurity Controls** module. Responsible roles managed in OpenProject; evidence stored in Nextcloud. | +| Business Controls  | Self-assessment                 | Annual MVSP audit tracked in **Unicis Cybersecurity Controls** module. Responsible roles managed in OpenProject; evidence stored in Nextcloud.  
-| Business Controls | External testing | Annual pentests performed. Findings tracked in **Unicis Cybersecurity Controls** and resolved in OpenProject. Results referenced in IRIS. | +| Business Controls  | External testing                | Annual pentests performed. Findings tracked in **Unicis Cybersecurity Controls** and resolved in OpenProject. Results referenced in IRIS.       
-| Business Controls | Training | Awareness and secure dev training delivered via Unicis Awareness Module. Participation tracked per user. | +| Business Controls  | Training                        | Awareness and secure dev training delivered via Unicis Awareness Module. Participation tracked per user.                                        
-| Business Controls | Compliance | ISO 27001, GDPR, MVSP mapped in **Unicis Cybersecurity Controls**. Regional segmentation enforced via Mautic. | +| Business Controls  | Compliance                      | ISO 27001, GDPR, MVSP mapped in **Unicis Cybersecurity Controls**. Regional segmentation enforced via Mautic.                                   
-| Business Controls | Incident handling | All incidents logged and resolved in IRIS. Escalation flows managed with SLAs (e.g. 72h for breaches). n8n used for automated notifications. | +| Business Controls  | Incident handling               | All incidents logged and resolved in IRIS. Escalation flows managed with SLAs (e.g. 72h for breaches). n8n used for automated notifications.    
-| Business Controls | Data handling | End-of-life handling logged in OpenProject. Data deletion procedures follow checklist in **Unicis Cybersecurity Controls**. |+| Business Controls  | Data handling                   | End-of-life handling logged in OpenProject. Data deletion procedures follow checklist in **Unicis Cybersecurity Controls**.                     |
  
-| Application Design Controls | Single Sign-On (SSO) | SSO (e.g., Keycloak) enforced across platform. Self-hosted clients can connect to external IdP. | +| Application Design Controls  | Single Sign-On (SSO)               | SSO enforced across platform. Self-hosted clients can connect to external IdP.                             
-| Application Design Controls | Multi-Factor Authentication (MFA) | MFA required for all critical systems using TOTP or YubiKey. Enforced at SSO level. | +| Application Design Controls  | Multi-Factor Authentication (MFA)  | MFA required for all critical systems using TOTP or YubiKey. Enforced at SSO level.                        
-| Application Design Controls | HTTPS-only | HTTPS enforced sitewide with HSTS; Let’s Encrypt certs auto-renewed. | +| Application Design Controls  | HTTPS-only                         | HTTPS enforced sitewide with HSTS; Let’s Encrypt certs auto-renewed.                                       
-| Application Design Controls | Security Headers | CSP, X-Frame, HSTS, etc. enforced by server and app; tested on CI/CD deploys. | +| Application Design Controls  | Security Headers                   | CSP, X-Frame, HSTS, etc. enforced by server and app; tested on CI/CD deploys.                              
-| Application Design Controls | Password policy | SSO enforces 12+ character passwords; passphrases supported; Zxcvbn used. No passwords stored locally. | +| Application Design Controls  | Password policy                    | SSO enforces 12+ character passwords; passphrases supported; Bitwarden used. No passwords stored locally.  
-| Application Design Controls | Security libraries | Shared internal security modules reviewed periodically. | +| Application Design Controls  | Security libraries                 | Shared internal security modules reviewed periodically.                                                    
-| Application Design Controls | Dependency patching | Monitored via Dependabot/Renovate. Wazuh flags CVEs. Fix SLA: <72h for critical. | +| Application Design Controls  | Dependency patching                | Monitored via Dependabot/Renovate. Wazuh flags CVEs. Fix SLA: <72h for critical.                           
-| Application Design Controls | Logging | Wazuh collects auth and admin logs. Logs retained ≥180 days. Alerts forwarded to IRIS. | +| Application Design Controls  | Logging                            | Wazuh collects auth and admin logs. Logs retained ≥180 days. Alerts forwarded to IRIS.                     
-| Application Design Controls | Encryption | AES-256 at rest, TLS 1.3 in transit. Secrets handled securely; API keys scoped and rotated. |+| Application Design Controls  | Encryption                         | AES-256 at rest, TLS 1.3 in transit. Secrets handled securely; API keys scoped and rotated.                |
  
 | Application Implementation Controls | List of data | Data types (PII, etc.) documented in EspoCRM. Models versioned in Git and listed in Nextcloud. | | Application Implementation Controls | List of data | Data types (PII, etc.) documented in EspoCRM. Models versioned in Git and listed in Nextcloud. |
Line 34: Line 34:
 | Application Implementation Controls | Build process | CI/CD pipelines enforce clean builds, no hardcoded secrets. Provenance signed and tracked. | | Application Implementation Controls | Build process | CI/CD pipelines enforce clean builds, no hardcoded secrets. Provenance signed and tracked. |
  
-| Operational Controls | Physical access | Data centers via Hetzner/Scaleway (ISO 27001). On-prem setups provided with compliance templates. | +| Operational Controls  | Physical access             | Data centers via Hetzner/Scaleway (ISO 27001). On-prem setups provided with compliance templates.                                   
-| Operational Controls | Logical access | RBAC + SSO + MFA enforced. Access reviews quarterly using **Unicis Cybersecurity Controls**. Inactive accounts deactivated by n8n. | +| Operational Controls  | Logical access              | RBAC + SSO + MFA enforced. Access reviews quarterly using **Unicis Cybersecurity Controls**. Inactive accounts deactivated by n8n.  
-| Operational Controls | Sub-processors | Public DPA maintained. Sub-processors reviewed annually and stored in Nextcloud. Linked to **Unicis Cybersecurity Controls**. | +| Operational Controls  | Sub-processors              | Public DPA maintained. Sub-processors reviewed annually and stored in Nextcloud. Linked to **Unicis Cybersecurity Controls**.       
-| Operational Controls | Backup & Disaster Recovery | Daily encrypted backups, restore tests monthly. Logged in OpenProject, tracked in audit module. |+| Operational Controls  | Backup & Disaster Recovery  Weekly encrypted backups, restore tests annually. Logged in OpenProject, tracked in audit module.                                   |