security_considerations
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
security_considerations [2016/12/14 16:16] – lucy | security_considerations [2021/12/13 15:13] (current) – lucysecurity | ||
---|---|---|---|
Line 1: | Line 1: | ||
We work hard in making LUCY a secure product. Here is a quick overview of the most important security topics: | We work hard in making LUCY a secure product. Here is a quick overview of the most important security topics: | ||
- | * **Restricted network based access to LUCY**: | + | * **Restricted network-based access to LUCY**: |
- | * **Secure the user access**: | + | * **Secure the user access**: |
- | * **Restrict the user access**: | + | * **2-Factor Authentication**: [[2-factor_authentication_2fa|2FA]] |
- | * **Secure Setup of LUCY**: | + | * **Restrict the user access**: |
- | * **Secure (and anonymous) storage of data**: | + | * **Secure Setup of LUCY in DMZ**: [[setting_up_a_lucy_master_slave|Master & Slave]] |
- | * **Secure communication channels**: | + | * **Secure (and anonymous) storage of data**: |
- | * **Transparent network communication**: | + | * **Delete sensitive data:** [[deleting_sensitive_data|Data clean-up]] |
- | * **Secure support**: | + | * **Secure communication channels**: |
- | * **Updates of the application | + | * **Transparent network communication**: |
- | * **Custom Admin URL creation**: | + | * **Secure support**: |
- | * **Ability to monitor all system activities**: | + | * **Updates of the application**: |
- | * **Ability to monitor the system in real time**: | + | * **OS, Patches & Software**: [[technical_information|Technical Information]] |
+ | * **Custom Admin URL creation**: | ||
+ | * **Ability to monitor all system activities**: | ||
+ | * **Ability to monitor the system in real-time**: | ||
+ | * **Data Security, Processes Privacy (GDPR)**: [[company_application_and_data_security|Company, | ||
+ | * **Ability to store key on HSM:** [[hsm_db_encryption|HSM Database encryption]] | ||
+ | * **Block access to campaigns based on IP-ranges and browser types**: [[filters|Filters]] | ||
+ | * **VPS Hardening info:** [[vps_hardening|VPS Hardening]] | ||
+ | * **Optional protection system:** [[suricata|IPS/IDS]] | ||
+ | |||
+ | |||
+ | Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https://www.owasp.org/). If you still should experience a security issue, please contact us under support@lucysecurity.com. | ||
security_considerations.1481728591.txt.gz · Last modified: 2019/07/25 12:50 (external edit)