Technical And Operational Security Measures
Overview
This documents purpose is to comply with design and default principles (Article 25, GDPR).
Privacy by default requires that protection of personal data be a default for all an organisation's systems and services. The essence of this concept is that only personal data which are necessary for each specific purpose of the processing are processed and data controllers must structure their systems and processes to meet the concept of data minimisation (Article 25(2), GDPR).
Ensure a level of security appropriate to the risk to the rights and freedoms of individuals, taking account of:
the state of the art;
the cost of implementing the measures; and
the nature, scope, context and purposes of processing.
Technical Measures
JEMHC
Best practice deployment architecture followed to isolate processing nodes at a network level
JEMH App is deployed in a highly available configuration to minimise downtime, is ‘fault tolerant’ and can automatically recover from failed nodes via health check monitoring
JEMHC nodes and databases are not publicly available (firewall enforce IP access to limited nodes)
JEMHC app is only available over SSL/TLS.
JEMHC communication (inbound/outbound) must be over a secure transport (SSL/TLS)
All customer data stored by JEMHC is encrypted at rest (database, other storage) to prevent any data leak from underlying storage system replacement
JEMHC will further encrypt specific Sensitive information like passwords
JEMHC deployment environment uses role based permissions applied to limited named users. A principle of least privilege is applied.
Queues are used to break up processing to ensure that high volume of events/data do not swap the system.
JEMHC Auditing whilst useful for customers to avoid data loss can be disabled, requires support involvement to reactivate
2FA is required when accessing JEMHC ‘flagged' support messages or accessing the JEMHC deployment environment at all
A combination of (restricted access) Client Certificates and IP level firewalls govern network access to the JEMHC app nodes.
Organisation
All customer data provided through support (or flagged through JEMHC) is available over a secure transport (SSL/TLS)
Only permanent employees have access to support systems and supplied customer data
Our company employs multiple layers of network security to prevent ingress.
All employee desktop/laptop environments are fully encrypted at rest
All employees primary authenticating accounts are 2FA secured
All passwords are stored in personal encrypted password storage apps
Operational Measures
JEMHC
Access to the JEMHC app environment is named user only
Permissions in the JEMHC app environment are role based, and follow the principle of least privilege
Access to customer ‘audit’ data is strictly limited to the CTO only.
Limited term backups are kept within the deployment environment infrastructure
Organisational
There is no outsourcing and are no subcontractors that could access customer data
Premises door access secured by key fobs as well as cameras.
Company offices are not left unoccupied, are locked securely at other times
Access to office by company employees and limited building staff
Any visitors are escorted at all times