180 likes | 322 Views
How Secure is Secure? Learning Security of Software. Presented by Lee Pepper and Casey Bader. Questions about Security. At some point in the sales process the questions about security arise I’ve led the discussion to this point Integration Data sharing Hosting.
E N D
How Secure is Secure? Learning Security of Software Presented by Lee Pepper and Casey Bader
Questions about Security • At some point in the sales process the questions about security arise • I’ve led the discussion to this point • Integration • Data sharing • Hosting
Kinds of Security Concerns • Administrative • Is a web client secure?
Kinds of Security Concerns • Administrative • Is a web client secure? • Too technical • Is the Internet secure? • Can someone hack our system? • Can we keep our program-specific data from other departments?
Kinds of Security Concerns • Technical • Do you encrypt your data? • How do you manage access? • Do you have audit logs? • What are your backup and restore plans?
General Security Concerns • Is a web application secure? • Have you ever purchased anything online? • Web applications can be secured by using encryption of the communication layer. • The use of an SSL key over HTTPS (secure connection)protects your data from being intercepted between your computer and the server.
General Security Concerns • Server Security • How do I know my files are secure?
General Security Concerns • Server Security • How do I know my files are secure? • All data access is logged.
General Security Concerns • Server Security • How do I know my files are secure? • All data access is logged. • Who can access the data?
General Security Concerns • Server Security • How do I know my files are secure? • All data access is logged. • Who can access the data? • All data access is controlled at the user level. • Per group, user, data logic • Data does not leave the server unless user is authenticated and authorized to view the data. • Business logic can be applied per field also. (SSN Masking) 123-12-1234 becomes xxx-xx-1234
General Security Concerns • Server Security • What if something bad happens? • Hosted Data • Data can be restored quickly via a backup that is run every 4 hours. (Can be run more often if required) • Local Data • This is dependent on your IT staff and facility managers • We suggest the above to protect your data.
Database Security • Hosted Security • Who has my data? • Green House Data • Secure Facility
Password Security • What about my password? • Passwords are secured by SHA (Secure Hash Algorithm) and this is done using the ASP.NET membership provider; a standard, scalable, user management system. • Administrators never have edit access to any passwords. • New auto reset path
Security Groups • Can a supervisor have different permissions than a caseworker? • Of course. User groups are a simple way to control access to special areas of the system as well as specific actions on objects. • Groups can control Add, Edit, Delete • They also are a part of business logic security. • E.g., if an application is ready for payout you must be a supervisor to update the next status.
Business Logic Security • How does business logic security work?
Business Logic Security • How does business logic security work?