User Tools

Site Tools


security_considerations

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
security_considerations [2019/02/15 12:38]
lucy
security_considerations [2019/10/08 14:19] (current)
lucy
Line 3: Line 3:
   * **Restricted network based access to LUCY**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=firewall_security_settings   * **Restricted network based access to LUCY**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=firewall_security_settings
   * **Secure the user access**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=password_policies_login_protection_strong_authentication   * **Secure the user access**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=password_policies_login_protection_strong_authentication
 +  *** 2FA Authentication**:​ https://​wiki.lucysecurity.com/​doku.php?​id=2-factor_authentication_2fa
 +  * **SSO**: https://​wiki.lucysecurity.com/​doku.php?​id=sso_authentication
   * **Restrict the user access**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=user_management   * **Restrict the user access**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=user_management
-  * **Secure Setup of LUCY**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=setting_up_a_lucy_master_slave+  * **Secure Setup of LUCY in DMZ**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=setting_up_a_lucy_master_slave
   * **Secure (and anonymous) storage of data**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=confidentiality_of_campaign_data  ​   * **Secure (and anonymous) storage of data**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=confidentiality_of_campaign_data  ​
 +  * **Delete sensitive data:** https://​wiki.lucysecurity.com/​doku.php?​id=deleting_sensitive_data
   * **Secure communication channels**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=ssl_configuration   * **Secure communication channels**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=ssl_configuration
   * **Transparent network communication**:​ http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=network_communication_-_lucy_--_internet ​   * **Transparent network communication**:​ http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=network_communication_-_lucy_--_internet ​
Line 14: Line 17:
   * **Ability to monitor the system in real time**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=system_performance_monitoring   * **Ability to monitor the system in real time**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=system_performance_monitoring
   * **Data Security, Processes Privacy (GDPR)**: https://​wiki.lucysecurity.com/​doku.php?​id=company_application_and_data_security   * **Data Security, Processes Privacy (GDPR)**: https://​wiki.lucysecurity.com/​doku.php?​id=company_application_and_data_security
 +  * **Ability to store key on HSM:** https://​wiki.lucysecurity.com/​doku.php?​id=technical_information&​s[]=hsm
  
  
 Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https://​www.owasp.org/​). If you still should experience a security issue, please contact us under support@lucysecurity.com. Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https://​www.owasp.org/​). If you still should experience a security issue, please contact us under support@lucysecurity.com.
  
security_considerations.1550230703.txt.gz ยท Last modified: 2019/07/25 12:50 (external edit)