User Tools

Site Tools


security_considerations

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
security_considerations [2019/02/15 12:38] lucysecurity_considerations [2019/10/08 14:19] lucy
Line 3: Line 3:
   * **Restricted network based access to LUCY**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=firewall_security_settings   * **Restricted network based access to LUCY**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=firewall_security_settings
   * **Secure the user access**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=password_policies_login_protection_strong_authentication   * **Secure the user access**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=password_policies_login_protection_strong_authentication
 +  *** 2FA Authentication**: https://wiki.lucysecurity.com/doku.php?id=2-factor_authentication_2fa
 +  * **SSO**: https://wiki.lucysecurity.com/doku.php?id=sso_authentication
   * **Restrict the user access**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=user_management   * **Restrict the user access**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=user_management
-  * **Secure Setup of LUCY**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=setting_up_a_lucy_master_slave+  * **Secure Setup of LUCY in DMZ**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=setting_up_a_lucy_master_slave
   * **Secure (and anonymous) storage of data**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=confidentiality_of_campaign_data     * **Secure (and anonymous) storage of data**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=confidentiality_of_campaign_data  
 +  * **Delete sensitive data:** https://wiki.lucysecurity.com/doku.php?id=deleting_sensitive_data
   * **Secure communication channels**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=ssl_configuration   * **Secure communication channels**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=ssl_configuration
   * **Transparent network communication**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=network_communication_-_lucy_--_internet    * **Transparent network communication**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=network_communication_-_lucy_--_internet 
Line 14: Line 17:
   * **Ability to monitor the system in real time**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=system_performance_monitoring   * **Ability to monitor the system in real time**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=system_performance_monitoring
   * **Data Security, Processes Privacy (GDPR)**: https://wiki.lucysecurity.com/doku.php?id=company_application_and_data_security   * **Data Security, Processes Privacy (GDPR)**: https://wiki.lucysecurity.com/doku.php?id=company_application_and_data_security
 +  * **Ability to store key on HSM:** https://wiki.lucysecurity.com/doku.php?id=technical_information&s[]=hsm
  
  
 Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https://www.owasp.org/). If you still should experience a security issue, please contact us under support@lucysecurity.com. Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https://www.owasp.org/). If you still should experience a security issue, please contact us under support@lucysecurity.com.
  
security_considerations.txt · Last modified: 2021/12/13 15:13 by lucysecurity