Available Policies
last updated: 07 April 2021
Access management generally requires three capabilities: the ability to identify and authenticate users, the ability to assign users access rights, and the ability to create and enforce access control policies for resources, as discussed below.
Identify and Authenticate Users. All service users are required to have a unique username and password. Passwords are hashed using SHA2-512 with a random salt and are not reversible. Passwords can only be reset not recovered. Access is limited to a set of whitelisted URLs and domains.
Only a single administrative role exists to access backend resources, such as database and web servers. This account is assigned to the current CTO. All other data access is performed via stored procedures for non-administrative service personnel.
Customer interfaces are accessed by six tiers of users;
Super administrators have the ability to create any level of user. Administrators can create new providers and volunteers.
All access levels are controlled by a combination of unique usernames, passwords, and whitelisting of URLs.
Individual developers do not have uncontrolled access to resources.
All data in transit to management consoles and public facing interfaces is protected by TLS and certificates are checked and renewed monthly. TLS is enforced for all URLs and the service is not accessible over unencrypted http access.
Our Qualys rating is A for our TLS protection; https://www.ssllabs.com/ssltest/analyze.html?d=demo.teamkinetic.co.uk&latest
All backup data in transit is encrypted using AES 256-bit end to end encryption and is transferred in a TLS encrypted tunnel.
Backup data is held in an encrypted AWS S3 bucket with no public access and only a single administrative account with permissions to access or update data.
Data access is filtered through the data access layer and SQL injection attacks are not possible due to the parameterized nature of all queries. Organisation data is siloed using a combination of URL whitelisting and login credentials. Administrators have full control over what, if any, opportunity data is shared with other organisations.
An audit log of destructive commands is maintained for 6 months, that includes the command, parameters, execution scope, and executing user.
Audit logs and traffic analysis is routinely checked for suspicious patterns that would indicate a potential data breach.
We will notify customers promptly, and within 24 hours, in the event of an actual or suspected personal data breach involving personal data. We will co-operate fully to investigate such a breach and will report the real or suspected breach in accordance with the Information Commissioner's Office guidelines.
All TeamKinetic managed clients run multiple endpoint protection. Security updates are downloaded and installed automatically on release.
Malwarebytes endpoint security is installed on each managed device for real time protection against malware, ransomware and additional malicious website protection. It detects and removes malware in real-time and also runs a local scan of the device daily.
All hosting servers are automatically patched with security patch releases, including patches for MSSQL, IIS or any critical subsystems.
Microsoft security bulletins are used to ensure vulnerabilities in operating systems are patched immediately that security patches are made available.
Access logs are used to check for potential XSS, injection or other malicious attacks via the application. Any threats that have the potential to succeed are discussed at weekly meetings and an action plan is enacted to mitigate such attacks.
Penetration tests are run during development for new releases at regular intervals. Live releases are penetration tested every month and the results discussed at monthly security meetings. Mitigation action plans are formed an enacted where necessary.
Hardware firewalls and traffic analysis are used upstream of the data hosting servers to mitigate the effects of DDoS attacks. A further level of software firewalls are used on all servers with a default rule of no access on any port. Ports are then opened singularly to enable the minimum services possible to run that server. Open ports are restricted to single or small ranges of IPs if no public access is required. No open FTP servers are allowed and sFTP access is granted in a time limited fashion if required.
We follow the OWASP security by design principles when developing new releases or functionality for our applications and APIs.