Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pub:trust_center:controls [15.06.2025 22:05] – [Table] Predrag Tasevski | pub:trust_center:controls [15.06.2025 22:09] (current) – [Table] Predrag Tasevski | ||
---|---|---|---|
Line 18: | Line 18: | ||
| Business Controls | | Business Controls | ||
- | | Application Design Controls | Single Sign-On (SSO) | SSO (e.g., Keycloak) | + | | Application Design Controls |
- | | Application Design Controls | Multi-Factor Authentication (MFA) | MFA required for all critical systems using TOTP or YubiKey. Enforced at SSO level. | | + | | Application Design Controls |
- | | Application Design Controls | HTTPS-only | HTTPS enforced sitewide with HSTS; Let’s Encrypt certs auto-renewed. | | + | | Application Design Controls |
- | | Application Design Controls | Security Headers | CSP, X-Frame, HSTS, etc. enforced by server and app; tested on CI/CD deploys. | | + | | Application Design Controls |
- | | Application Design Controls | Password policy | SSO enforces 12+ character passwords; passphrases supported; | + | | Application Design Controls |
- | | Application Design Controls | Security libraries | Shared internal security modules reviewed periodically. | | + | | Application Design Controls |
- | | Application Design Controls | Dependency patching | Monitored via Dependabot/ | + | | Application Design Controls |
- | | Application Design Controls | Logging | Wazuh collects auth and admin logs. Logs retained ≥180 days. Alerts forwarded to IRIS. | | + | | Application Design Controls |
- | | Application Design Controls | Encryption | AES-256 at rest, TLS 1.3 in transit. Secrets handled securely; API keys scoped and rotated. | | + | | Application Design Controls |
| Application Implementation Controls | List of data | Data types (PII, etc.) documented in EspoCRM. Models versioned in Git and listed in Nextcloud. | | | Application Implementation Controls | List of data | Data types (PII, etc.) documented in EspoCRM. Models versioned in Git and listed in Nextcloud. | | ||
Line 34: | Line 34: | ||
| Application Implementation Controls | Build process | CI/CD pipelines enforce clean builds, no hardcoded secrets. Provenance signed and tracked. | | | Application Implementation Controls | Build process | CI/CD pipelines enforce clean builds, no hardcoded secrets. Provenance signed and tracked. | | ||
- | | Operational Controls | Physical access | Data centers via Hetzner/ | + | | Operational Controls |
- | | Operational Controls | Logical access | RBAC + SSO + MFA enforced. Access reviews quarterly using **Unicis Cybersecurity Controls**. Inactive accounts deactivated by n8n. | | + | | Operational Controls |
- | | Operational Controls | Sub-processors | Public DPA maintained. Sub-processors reviewed annually and stored in Nextcloud. Linked to **Unicis Cybersecurity Controls**. | | + | | Operational Controls |
- | | Operational Controls | Backup & Disaster Recovery | Daily encrypted backups, restore tests monthly. Logged in OpenProject, | + | | Operational Controls |