2023-04-11 NOTICE: The following policy or plan is currently under internal review and may not be up-to-date or fully aligned with our organization's current practices or procedures. Please check back shortly, or contact us for more information.
Data Integrity Policy
Fox and Geese takes data integrity very seriously. As stewards and partners of
Fox and Geese Customers, we strive to assure data is protected from unauthorized
access and that it is available when needed. The following policies drive many
of our procedures and technical settings in support of the Fox and Geese mission
of data protection.
Production systems that create, receive, store, or transmit Customer data
(hereafter "Production Systems") must follow the guidelines described in this
section.
Applicable Standards
Applicable Standards from the HITRUST Common Security Framework
- 10.b - Input Data Validation
Applicable Standards from the HIPAA Security Rule
- 164.308(a)(8) - HIPAA Security Rule Evaluation
Disabling Non-Essential Services
- All Production Systems must disable services that are not required to achieve
the business purpose or function of the system.
Monitoring Log-in Attempts
- All access to Production Systems must be logged. This is done following the
Fox and Geese Auditing Policy.
Prevention of Malware on Production Systems
- All Production Systems must have OSSEC running, and set to scan system every
2 hours and at reboot to assure no malware is present. Detected malware is
evaluated and removed.
- Virus scanning software is run on all Production Systems for anti-virus
protection.
- Hosts are scanned daily for malicious binaries in critical system paths.
- The malware signature database is checked hourly and automatically updated
if new signatures are available.
- Logs of virus scans are maintained according to
Configuration Management Policy.
- All Production Systems are to only be used for Fox and Geese business needs.
Patch Management
- Software patches and updates will be applied to all systems in a timely
manner. In the case of routine updates, they will be applied after thorough
testing. In the case of updates to correct known vulnerabilities, priority
will be given to testing to speed the time to production. Critical security
patches are applied within 30 days from testing and all security patches are
applied within 90 days after testing.
- In the case of PaaS Customers, updates to Application and Database versions
are the responsibility of Customers, though Fox and Geese will, at its own
discretion, notify and recommend updates to Customer systems.
- Administrators subscribe to mailing lists to ensure that they are using
current versions of all Fox and Geese -managed software on Production
Systems.
Intrusion Detection and Vulnerability Scanning
- Production systems are monitored using IDS systems. Suspicious activity is
logged and alerts are generated.
- Vulnerability scanning of Production Systems must occur on a predetermined,
regular basis, no less than annually. Currently it is weekly. Scans are
reviewed by Security Officer, with defined steps for risk mitigation, and
retained for future reference.
Production System Security
- System, network, and server security is managed and maintained by the
Security Officer in conjunction with the Dev Ops team.
- Up-to-date system lists and architecture diagrams are kept for all production
environments.
- Access to Production Systems is controlled using centralized tools and
two-factor authentication.
Production Data Security
- Reduce the risk of compromise of Production Data.
- Implement and/or review controls designed to protect Production Data from
improper alteration or destruction.
- Ensure that confidential data is stored in a manner that supports user access
logs and automated monitoring for potential security incidents.
- Ensure Fox and Geese Customer Production Data is segmented and only
accessible to Customers authorized to access data.
- All Production Data at rest is stored on encrypted volumes using encryption
keys managed by Fox and Geese . Encryption at rest is ensured through the use
of automated deployment scripts referenced in the
Configuration Management Policy.
- Volume encryption keys and machines that generate volume encryption keys are
protected from unauthorized access. Volume encryption key material is
protected with access controls such that the key material is only accessible
by privileged accounts.
- Encrypted volumes use AES encryption with a minimum of 256-bit keys, or keys
and ciphers of equivalent or higher cryptographic strength.
Transmission Security
- All data transmission is encrypted end to end using encryption keys managed
by Fox and Geese . Encryption is not terminated at the network end point, and
is carried through to the application.
- Transmission encryption keys and machines that generate keys are protected
from unauthorized access. Transmission encryption key material is protected
with access controls such that the key material is only accessible by
privileged accounts.
- Transmission encryption keys use a minimum of 4096-bit RSA keys, or keys and
ciphers of equivalent or higher cryptographic strength (e.g., 256-bit AES
session keys in the case of IPsec encryption).
- Transmission encryption keys are limited to use for one year and then must be
regenerated.
- In the case of Fox and Geese provided APIs, provide mechanisms to assure
person sending or receiving data is authorized to send and save data.
- System logs of all transmissions of Production Data access. These logs must
be available for audit.