|
Certification Path
Automation Path
Features
Services
Process
Technology
Security
Technology Platform
Tech Support
Demo
|
|
Our Commitment
Security is an extremely important part of the OHS18 infrastructure. We are committed to continuously examining our security methods to ensure that our customers receive the most advanced level of security possible. Our engineers have incorporated state-of-the-art technology to assure privacy, reliability and security of your Occupational Health & Safety Management System (OHSMS) at every level.
OHS18 utilizes state-of-the-art operating system hardening techniques to secure our servers. This includes limiting user accounts and services to those monitored and required by our system. These security features include:
Enabled password aging
Restricted file shares and folders
Data Encryption
Encryption: When a user logs on to a dedicated OHS18 site, the system can identify the user. We control what can be read and what functionality is available based on previously assigned responsibilities. Each feature of the OHS18 application also can be configured with a different access control list.
Terminal Sessions/File Transfers: When terminal sessions and file transfers are used they are encrypted. Different components of the infrastructure use different encryption schemes such as SSH, IKE, RC4 and 3DES-CBC.
Disaster Recovery/Data Backup
Data Backup: Data is backed up at regular intervals via "SnapShot" technology. Snapshots of the file system are taken nightly and full, weekly backups are made off-site, which enables us to restore any file in the last 21 days within one-day resolution.
Restoration of Service: We can restore service within 30 minutes of approval for files needing to be restored in the last 21 days. For files prior to 21 days, we can restore service from monthly backups. In the event of a disaster, restoration times will vary depending on the geographic extent of the disaster and the size of customer data affected.
Application Security
Secure Sockets Layer (SSL): The OHS18 application supports server side authentication with a 128 bit key length - one of the strongest SSL encryptions. This allows users to authenticate our server and be assured of secure communication. Data is encrypted in both directions to ensure complete security of all transmissions between both parties.
Virus Protection: OHS18 scans the hosted environment for viruses and does not install or run code that has not been pre-scanned.
Mobile Code Security: Our servers do not accept mobile code. Machines used by administrators are limited to encrypted terminal sessions with the servers and are protected by virus scans.
Network Segmentation
Remote Access: Encrypted terminal sessions can only be used by a limited set of approved personnel who have a business need to access the operating systems. All new remote access must be approved and configured by the engineering team.
Monitoring
Auditing: Physical access to the cage is logged and tracked by the co-location provider. The servers log users' connections, while the application logs all changes to customers' data and retains this information indefinitely.
Audit Log Review: We review the logs of changes to the system on a monthly basis and investigate suspicious patterns of activity based on established baselines. Relevant parties are notified of problems.
Security Scans: Rather than perform automated security scans, we perform manual security scans on a monthly basis. These scans attempt to assess potential areas of risk.
Emergency Notification: OHS18 has a security procedure in place to notify our customers immediately if actual or suspected intrusion either physical or logical occurs. Our dedicated team of system administrators is well trained to respond to security incidents. In the event of a breach, we will remove a compromised server from the network immediately and cordon it off to investigate the extent of the damage.
Information Security
Security Policy Communication: All employees/contractors sign agreements related to security upon hire. OHS18 has a formalized code of conduct defining standards of behavior for our employees. This document addresses various types of security, including Information System Security, Computer Network Security, Physical Access, Internet Access and Information Privacy, but does not contain individual policies for each.
|
Part: 1 of 2 |
|
|
|