security_considerations
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
security_considerations [2019/02/15 12:38] – lucy | security_considerations [2019/10/08 14:19] – lucy | ||
---|---|---|---|
Line 3: | Line 3: | ||
* **Restricted network based access to LUCY**: http:// | * **Restricted network based access to LUCY**: http:// | ||
* **Secure the user access**: http:// | * **Secure the user access**: http:// | ||
+ | *** 2FA Authentication**: | ||
+ | * **SSO**: https:// | ||
* **Restrict the user access**: http:// | * **Restrict the user access**: http:// | ||
- | * **Secure Setup of LUCY**: http:// | + | * **Secure Setup of LUCY in DMZ**: http:// |
* **Secure (and anonymous) storage of data**: http:// | * **Secure (and anonymous) storage of data**: http:// | ||
+ | * **Delete sensitive data:** https:// | ||
* **Secure communication channels**: http:// | * **Secure communication channels**: http:// | ||
* **Transparent network communication**: | * **Transparent network communication**: | ||
Line 14: | Line 17: | ||
* **Ability to monitor the system in real time**: http:// | * **Ability to monitor the system in real time**: http:// | ||
* **Data Security, Processes Privacy (GDPR)**: https:// | * **Data Security, Processes Privacy (GDPR)**: https:// | ||
+ | * **Ability to store key on HSM:** https:// | ||
Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https:// | Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https:// | ||
security_considerations.txt · Last modified: 2021/12/13 15:13 by lucysecurity