Lua Security Whitepaper - Citrix Ready Marketplace
Transcription
Lua Security Whitepaper - Citrix Ready Marketplace
Instant, Secure and Accountable Lua Security Whitepaper Security is Paramount We know that when you communicate with your team, information security is paramount. The information discussed, the files circulated, and the decisions made all help your organization maintain its competitive edge. Major organizations across all industries use Lua every day to communicate and share files, and we never take that trust for granted. Lua is an enterprise-grade, mobile first solution that adheres to the highest industry standards for security at every level. Connect your staff and share information with confidence. LUA SECURITY WHITEPAPER 1 section one Lua Security Overview Lua allows you to securely and instantly message, call and share files with colleagues from any device. Track account activity, revoke access to files and remotely lock or wipe data from a lost or stolen device — quickly and easily. 30% of IT practitioners say they have no mobile security features in place.1 Protection at the app level Data is segmented at the Network level within Lua; under no circumstances will it be available to users who have not been invited into a specific network. Each device used to access a user account is associated with that account via the user’s email address. Upon logging out, all data is removed from the client device. Administrators can revoke access to individual users, instantly removing all data from the user’s device. Allow admins to easily grant and revoke access to conversations and files. Protection at the platform level All connections are 256-bit TLS encrypted, both at rest and in transit. A service-oriented architecture allows us to isolate our components and compartmentalize permissions between them. The codebase is regularly audited for cross-site scripting, SQL injection, cross site request forgery, unpatched insecurities in external libraries and flaws in authentication and session management. Regular penetration testing is performed using the same tools malicious hackers use, so that new vulnerabilities are assessed as they are discovered. 1. Raytheon Cyber Products, “Security in the New Security updates for 3rd party components are typically performed Mobile Eco-System”, 2014 within 24 hours of availability. LUA SECURITY WHITEPAPER 2 Protection at the facilities level Lua’s data centers provide state of the art physical security to our clients. With ISO 27001 certifcation and regular SOC 1 audits, our physical infrastructure is trusted by Fortune 500 companies, government agencies and NGOs. Multiple Availability Zones are used for a high degree of physical redundancy, mitigating the impact of network outages and natural disasters. Lua works to take advantage of new physical security measures as they become available. Lua Security Architecture Storage Tier Application Tier Encrypted Volume Encrypted Volume Firewall TLS Encrypted Device LUA SECURITY WHITEPAPER 3 section two 52% of IT professionals say mobile security practices have been sacrificed in order to improve employee productivity.2 Encryption of Data Lua’s cloud-based services offer 256-bit Transport Layer Security (TLS) encryption to ensure the privacy of confidential messages and files during transfer and in storage. Your data is backed up on redundant servers and protected by geography, people and failsafes, ensuring its availability, no matter what. Lua also uses industry standard ciphers and protocols to protect your sensitive data from end to end - at rest and in transit, including the Advanced Encryption Standard (AES). Lua’s SSD volume is also encrypted at a hardware level. In addition to our database, all logs and data being passed through our messaging servers and devices are fully encrypted. Encryption of Data Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Malicious users may intercept or monitor data transmitted across unencrypted networks and gain unauthorized access which jeopardizes the confidentiality of the sensitive data. The secure transmission of data in transit and at rest relies on both encryption and authentication − on both the hiding or concealment of the data itself, and on ensuring that the computers at each end are valid. Encryption does not of itself prevent interception, but rather denies the message content to the interceptor. In a traditional encryption scheme, the message or information, referred to as plaintext, is encrypted using an algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by the algorithm. While in principle it may be possible to decrypt a message without possessing the key, it is almost mathematically improbable and would require extremely large computational resources, unprecedented technical abilities and a genius level mathematical skill set. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors. 2. Ponemon Institute, “Corporate Data: A Protected Asset or a Ticking Time Bomb?”, 2014 LUA SECURITY WHITEPAPER 4 Encryption at Rest Encrypted data stays encrypted even when access controls such as usernames and password fail -- meaning all of your Lua data is encrypted while it remains on the client device. The data also maintains its security while resting on the server at the hardware level. Encryption in Transit Data in transit can be defined as the flow of information over a network, such work personal as the internet or an internal private network. When sensitive data is going from the client device to a server, 256-bit TLS prevents ‘man in middle’ attacks (i.e. eavesdropping). The sent data maintains full encryption while in this transit period, preventing access by unauthorized users. Lua Encryption Best Practices More than one half of all employees access business applications from personally owned mobile devices.3 Data encryption keys are updated on a regular basis Encryption keys are stored separately from the data Periodic auditing of sensitive data Only store the minimum amount of sensitive data as possible Regular monitoring of threats Powerful firewall What is AES? Simply put, the Advanced Encryption Standard (AES) is a web tool cipher used to encrypt and decrypt text using the AES encryption algorithm. Administrators can chose 128, 192 or 256-bit long key size for encryption and decryption. The result of the process is downloadable in a text file. In more technical terms, AES is a symmetric block cipher used by the U.S. government and major enterprises to protect classified information. It is implemented in software and hardware throughout the world to encrypt sensitive data. AES is robust and capable of protecting vital information well into the next century. 3. Raytheon Cyber Products (see footnote 1) LUA SECURITY WHITEPAPER 5 AES comprises three block ciphers, AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192- and 256-bits, respectively. Symmetric or secret-key ciphers use the same key for encrypting and decrypting, so both the sender and the receiver must know and use the same secret key. All key lengths are deemed sufficient to protect classified information up to the “Secret” level with “Top Secret” information requiring either 192- or 256-bit key lengths. There are 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys -- each round consists of several processing steps 71% of end users say they have access to confidential corporate data that they should not see. 4 that include substitution, transposition and mixing of the input plaintext and transform it into the final output of ciphertext. What is TLS? TLS is a cryptographic protocol designed to provide communication security over a network, ensuring privacy between communicating applications and their users on the internet. When a server and client device communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL). TLS and SSL are most widely recognized as the protocols that provide secure HTTP (HTTPS) for Internet transactions between web browsers and web servers. TLS is composed of two layers: the TLS Record Protocol and the TLS Handshake Protocol. The TLS Record Protocol provides connection security with some encryption method such as the AES or Data Encryption Standard (DES). The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In the authentication process, a TLS/SSL client sends a message to a TLS/SSL server, and the server responds with the information that the server needs to authenticate itself. The client and server perform an additional exchange of session keys, and the authentication dialog ends. When authentication is completed, SSL-secured communication can begin between the server and the client using the symmetric encryption keys that are established during the authentication process. 4. Ponemon Institute (see footnote 2) LUA SECURITY WHITEPAPER 6 TLS Enhancements to SSL The keyed-Hashing for Message Authentication Code (HMAC) algorithm replaces the SSL Message Authentication Code (MAC) algorithm. HMAC produces more secure hashes than the MAC algorithm. The HMAC produces an integrity check value as the MAC does, but with a hash function construction that makes the hash much harder to break. Key Benefits of Using TLS Encryption Strong authentication, message privacy, and integrity TLS can help to secure transmitted data using encryption technology. TLS also authenticates servers and authenticates clients to prove the identities of parties engaged in secure communication. It also provides data integrity through an integrity check value. In addition to protecting against data disclosure, the TLS security protocol can be used to help protect against masquerade attacks, man-in-the-middle or bucket brigade attacks, rollback attacks, and replay attacks. Interoperability TLS/SSL works with most Web browsers and on most operating systems and web servers, including the Microsoft Windows, UNIX, Novell, Apache, Netscape Enterprise Server and Sun Solaris. It also is often integrated in news readers, LDAP servers, and a variety of other applications. Algorithm flexibility TLS provides lots of options for the authentication mechanisms, encryption algorithms and hashing algorithms that are used during the secure session. LUA SECURITY WHITEPAPER 7 section three Securing Your Data Overall Security Responsibility Security in the cloud is slightly different than security in your on‐premises data centers. Since Lua is cloud-based, security responsibilities are shared between you and Lua. Lua is responsible for securing the underlying infrastructure that supports the cloud and protecting your data. You are responsible for using secure passwords and best practices (like mobile phone lock codes). 60% of IT professionals believe employees have become less diligent in practicing good mobile security. 5 Physical and Environmental Security Your data is stored in world-class, highly secure, audited data centers that utilize state-of-the art electronic surveillance and multi-factor access control systems. All data centers are housed in nondescript facilities, staffed 24x7 by trained security guards and access is strictly authorized. Environmental systems are designed to minimize the impact of disruptions to operations. Multiple geographic regions and Availability Zones allow you to remain resilient in the face of most failure modes, including natural disasters or system failures. Data center access is only provided to employees and contractors who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked. All physical access to data centers by employees is logged and audited routinely. Data Reliability Lua data servers reside in SSAE 16 accredited datacenters with features including hurricane-rated roofs and multiple redundant power sources. All data is automatically updated to servers in separate locations. Regular backups are performed on all data, including off-site data backups to protect against almost all disaster scenarios. 5. Raytheon Cyber Products (See footnote 1) LUA SECURITY WHITEPAPER 8 Fire Detection and Suppression Automatic fire detection and suppression equipment has been installed to reduce risk. The fire detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller rooms and generator equipment rooms. These areas are protected by either wet‐ pipe, double‐interlocked pre‐action, or gaseous sprinkler systems. Power The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide back‐up power in the event of an electrical failure for critical and essential loads in the facility. Data centers use generators to provide back‐up power for the entire facility. one third of IT leaders say their organization does not have a mobile security strategy for all sensitive and confidential proprietary data.6 Climate and Temperature Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain optimal atmospheric conditions. Personnel and systems monitor and control temperature and humidity at appropriate levels. Management The data centers monitor electrical, mechanical and life support systems so that any issues are immediately identified. Preventative maintenance is performed to maintain the continued operability of equipment. Storage Device Decommissioning When a storage device has reached the end of its useful life, procedures include a decommissioning process that is designed to prevent customer data from being exposed to unauthorized individuals. Techniques detailed in DoD 5220.22‐M (“National Industrial Security Program Operating Manual “) or NIST 800‐88 (“Guidelines for Media Sanitization”) are used to destroy data as part of the decommissioning process. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry‐standard 6. Raytheon Cyber Products (See footnote 1) practices. LUA SECURITY WHITEPAPER 9 Availability Data centers are located in clusters in various global regions. In case of failure, automated processes move customer data traffic away from the affected area. Applications are deployed in an N+1 configuration, so that in the event of a data center failure, there is sufficient capacity to enable traffic to be load‐balanced to the remaining sites. The data centers offer flexibility to place instances and store data within multiple geographic regions as well as across multiple availability zones within 45% of senior executives surveyed say their company experiences cyber attacks hourly or daily. 7 each region. Each availability zone is designed as an independent failure zone. This means that availability zones are physically separated within a typical metropolitan region and are located in lower risk flood plains (specific flood zone categorization varies by Region). In addition to discrete uninterruptable power supply and onsite backup generation facilities, the centers are each fed via different grids from independent utilities to further reduce single points of failure. All availability zones are redundantly connected to multiple tier‐1 transit providers. Distributing applications across multiple availability zones allows the servers to remain resilient in the face of most failure modes, including natural disasters or system failures. Incident Response The data centers employ industry‐standard diagnostic procedures to drive resolution during business‐impacting events. Staff operators provide around the clock coverage to detect incidents and manage the impact and resolution. Communication Various methods of internal communication have been implemented at a global level to help employees understand their individual roles and responsibilities and to communicate significant events in a timely manner. Lua will alert you immediately to any potential problems or issues. 7. http://www.ponemon.com, 2015. LUA SECURITY WHITEPAPER 10 Secure, Enterprise Text Messaging Lua’s comprehensive mobile messaging solution offers advanced security features at every level -- the device, the network and physical locations. Rest assured your data is safe, no matter where or how you work. LUA SECURITY WHITEPAPER 11 The enterprise communication solution. Instant, secure, and accountable. www.getlua.com learnmore@getlua.com